Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
0bfca0e17332f73ec9b91ec6a54c1392_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0bfca0e17332f73ec9b91ec6a54c1392_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0bfca0e17332f73ec9b91ec6a54c1392_JaffaCakes118.html
-
Size
53KB
-
MD5
0bfca0e17332f73ec9b91ec6a54c1392
-
SHA1
beb6f102b7b71de089ab6f77275c938e1c796622
-
SHA256
9a62da1ce3227e6c3b966d87df26e13615cdb77832aeb52c55e31f26a3a5434d
-
SHA512
b76127a059ef7b2190bada2f6c49f6330954d7111df4cac6e354f5ce3f7c982f019c6c624e272b868eeaf2559da0ecce0724f70729c9386ce208bf103f175b4b
-
SSDEEP
1536:CkgUiIakTqGivi+PyUerunlYA63Nj+q5VyvR0w2AzTICbb3oV/t9M/dNwIUEDmDA:CkgUiIakTqGivi+PyUerunlYA63Nj+qk
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425443275" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B044E01-3298-11EF-9ED8-52FE85537310} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7011b5e0a4c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004572276cf58d494f832531d7871c265600000000020000000000106600000001000020000000e07e1dd822deb0a9e492102a4acb1f4f198da7c6b4b19fa54fe33cfc995fbf22000000000e8000000002000020000000291e1d0db020bc84fb47dad62f4c111556d8fbf70fde45d90e342b1413f7fde120000000f5793ac1b65fc51fc77c81aad900cfa11b0ec0a4637952b4af5f65ce87c7a5eb400000007c6590acbaf1fbf07805b220e0460f63623e75260f5ba47a7472c3e1de744574b8988886792e2c31696c782172f25bc2895b547edc99f18833b41c7f2c5dcdcf iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 3012 2700 iexplore.exe 28 PID 2700 wrote to memory of 3012 2700 iexplore.exe 28 PID 2700 wrote to memory of 3012 2700 iexplore.exe 28 PID 2700 wrote to memory of 3012 2700 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0bfca0e17332f73ec9b91ec6a54c1392_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596e60e785c9cacac295ed53295f3a923
SHA1ae0d604e3e776ec079bdd4782ef0e79ee03c764b
SHA2560ea4e537939ef126d3d4091a697a459b0b4150673240074a5f3677fc9fc62dd9
SHA512b3c14cc182b53eed8f5227f1d3ca84ad07317b10c8c1f8262dcf96316e69b389031cde5111ed0476ba6f4ca5396ddb7d4ff770946cc27c8f730378cb07b0439b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5441e01246b5efa2c5390ec56883b771a
SHA100b03e00e32f2fae5e4eb75f332331498cacc12d
SHA2567fd71d8a1c00472a4c506528c72235cf7cce1a4b48faa542224169c9eeda3fca
SHA5129cdbd7ecc58c0f674cf9b9c72071376a348ae7ddb744f2901497c5f5051401932874112deb96db9473b0531cd8c133fec067707f40018a7c8e1285d151ca118a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5431d9411a361f497c3849b682c15f73f
SHA1ba2ab00d4f8952b6ab2398153f47206a900ce6ba
SHA256570965beb04e393147b980c10472666a6f351158f7d7ce275c356e268143cf73
SHA512dcb2666c725103f28c718dd292840993409b4f1850971bed99e5400c81ead155273426989094f61b43ae8935e6c5392785efd292e4b61ff89565792cd77a3361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551a88a4a3bc166294ddf8c00d632b791
SHA11ec30c2d18367cb19852cb9448d39d6a9c4375f0
SHA256e18c9be9f756773cafca499ed0ccb2dd4eeed0a74c46a45c9932abaa42b400cd
SHA512c6942cf705c2818ae0ce1b2a0a36b78df6fa290c6356d5effb47b41ba845893c1e6b7091c525ba1d73746a1775471fe9c6555460b91ab8adac7dfaf49f4bfdf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e837a92e032128316b96045065298181
SHA1afd3c53a754a9a650e85bbd238ca71fffddd01f1
SHA2567448eacff85f7676f3d811946b94b857b34fcc7b5486bab096f3a6d24069242d
SHA5123210f881aff78415cc79f6f80cd331b3420b4df5a5d0c8d77af6b4abac46ce861ad6ada62319d1afc36e36c0c64a6f9400aec356c6205af748985799ed3a8205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548d82de9458369e2f0acfd65b612d447
SHA1781fa9b3f19948896c025936612643e38b74c479
SHA256c3e96a5060329c4f441c873f18197b611997e6c35326985e0347d7550bb6cacc
SHA512ae44eafe4354f37ed8c12abec37cc1720cd43518fe8536985765996d7464f033b99e60839839a03582f66db628ebaf4b0f4cc59875796b18b5f6eb38fdb0c1ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4265e0eee8bc3e3a1f6928d3876acdd
SHA1e65dbf62da6160c57f447e271de75332eb4c8c45
SHA25672b038e35e3a9f350df55b601ed90d0174592dad130f708ec18ff468cdec505f
SHA512487a45e8ca97d88b4d177ad86b8bfa42794f87b185a6044230e52c3f35112a4c2f1df35a43ce9988f482482f17f91a594b8c66806b076278111c5c9cf3c6815b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bab7887b652bbc7bad84032678be4a04
SHA156418b24471e10c97419dff03ffd5d4bd8a69f6c
SHA25684b91a28f2591d615c4d9c680df09b93f82e6db1b93eb2f3ed8cbb52e2983af5
SHA51249cf2baee2666466feb3f497a7f4912cbccd64e28b814d632db94301f9e1e285e3a4d38299cad68f7710a96f4bc721a897ad4562f532e4a54d5ed9a26e447edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5102c8ed408e3e4f432481b99f5af8395
SHA18e8bb0a8c8cbf061c2f1480fa4108c02ec38b157
SHA256755111187b1c57870183557055071f3e9ace419fd1459dc85db006fe16186e25
SHA51279d98a875e05d0d3b7c955a4cedf9160334b821a698c7f5da384dd67aa25f176408bae2f194c79d07f0adfd850256000bcae9926e99f7ad729a7b505f2143ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d145d7f046d90663ec69b234a5b6494
SHA1b15ecaff822a7bd99a2be9c8444891f9b969045f
SHA2564ffc3801f0b469b4480c287eaa590ab197304305572ae04b63db6dd18e081ef3
SHA51217f603b27e12165b99e29fab02a18b7adfdb26d4f73b3d722a2fc1cbe69518fe6746a2e51ded6448715aefc064cea88e4371b3434feb33dbb98a2e9b7b691b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5d95841be4223fb560cf1975eecaf7f
SHA190432d3a20668fb32d66f025725e7dba7fadc577
SHA25625aeb590bb2d11bee029386c54483e4a018bffe482b2ed2c7743dfc7e8e75192
SHA51201d7566671b3849cd0566efd68efad2b85d7359e917a1468a3a27cd1a8fdd9475f1270e5e413c13538cef625a3dffee71d38e51228feb8df6370227efd7562b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ff3add00c2eb92bc95a09a1dc8a1c9c
SHA1af0b2b352e0fc7d3d706b7fa2524d4bb119763c9
SHA2560805618a6d858e3c089402bc62a3af785a3e83b76388794a508ae46b509bf90f
SHA512a26e075ec33054dddaa50d486b9790879ab558a2d05fd694af82af119742fcaa4af5f58d8b4cb76537975bac56197c16dd73ac9205c4c15a92e4a0428b06cae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4cedf3ca99e708fb446154285b1d1d7
SHA123f9313a00f0644c321021d3f4f25f79ac1f07d5
SHA25620f1c811e35443966af4bd0efc9b53b77b1b8f24cc351faaee5960c7bc93de2e
SHA5128efe3b7078c5c4f3ef18720edb557dbf76f7272faaeacba7532cd8c91d03c3a98bd55a272cdfcbaa3dcb3044cc1e7c9f3e982fb0d6f7e5cc1fa7d789c9e56e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5121a195735ea76fc770babe6c6d865d8
SHA1dfa78c18d67a07490bef9c47ecde15a9794bb797
SHA256ada9ef838c6cdd30711e5eaf901e41ccc263e13422890a43f2feef4f7b44f5e8
SHA512ea7f486adc22dc52a198e7a62282961570a45e0e8fe54b3d5015aaf12cd031e65a6c85f681e9688fb97f53558f6f549690be8df33c28874eaaf51a7dd359fc57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51135a70abe87045ed83dba72a0d2f20d
SHA1b3c53e092891ba7ca356480987b1c022fac60e35
SHA256ba5cd675494e4fb98114a048805bec1afafbb2c6dc8149f301277128b7ee246d
SHA512c1d9c980518d7a253579eefd458512df9e7c254cb66c219b0fc060a8cc6b1832faf43d041df0c4b3eff056a9cc819f785447523ce584b80c3c5c7f0a04d0817a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54105a5cd57de74e5f3a724542483a417
SHA10050644873c218e535506a12c20ca95b614e8407
SHA2562de7b3b6678b17698c8f70c00d8fbfdd8e33c4bf04ddf697d5b4be35f2d023f4
SHA5121185277e8014ecbd15285ac21f2c94a40fe4a94f0b3e495e750282910abe78a3ed5b6463694927d414d47353a027054fe32feed277bd262e96e6a0eae6bcd735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545a49506fc738e48f3aed9d97adc52cc
SHA15864764db78d00496ce412720f46a6b0a71700d9
SHA2561fa7a653aa1017264387a4428f2947819daf56995094bae8d694386305a89282
SHA512aa07293d99130080ae0dbf1066f810a527a6456b7c1dd9e7ec2ef912dc3d536b0a109eddaacc275279a60c76539ecf5a7bc16256ada19c688f4dc90404f67b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bf2762eb3f4142e9cfc47eb9f5c4957
SHA159e33278a1e783d4665ab88e9170fd44b1f7d897
SHA25675781716b518305e5ba272a96ae1c6e2a00da51641681ae5ab90abb8bf764190
SHA51263c8645e29e96ae47a5d8be7e3a1fe389ed64dc7ed1822261199c179b9c673ee29fb2e8def6dde656b447e2b39293f8a58bdad4de775bfca9e7b97ae6e1d3b94
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I819HQXH\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b