Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
26/06/2024, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
102f94b61b852cd8420b4f62b47c2f4d_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
102f94b61b852cd8420b4f62b47c2f4d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
102f94b61b852cd8420b4f62b47c2f4d_JaffaCakes118.html
-
Size
7KB
-
MD5
102f94b61b852cd8420b4f62b47c2f4d
-
SHA1
384f2e49350d0ef36c9ec9039db7114301cf4ca6
-
SHA256
cb02680fb5fc460ea8e70f484763af58180ba7688261aaaca98b4a1dd135ddd9
-
SHA512
4ac9795958e315c5f25ac2ec1d9917da5f56dca24fb605aa01681af2e0852889fb5033b9d7d8262ca742b1f1420953511a3003285e5ca54ff4cc71fa5a56016e
-
SSDEEP
192:ln8uqnGDSSW0nqFhHcit7/bk7iaiqe6yO3sIxWJDJJYX6y:ln8uqnGDnW0qFhHcit7/Q7iaiqe6h3sw
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA8A1AF1-3357-11EF-9EC9-FEBBC6272832} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425525657" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000c1c19bf3daa54998233ecda4607649d781dbf2085853a5a1f1c22b816609bd57000000000e800000000200002000000035f2f60d3ed675d35397034754b9f3dad38dd9db367204e9c4f4d3ccde2ee953200000001ce5fb4010f270df7ef893b846d2a9182da22f214e39032b645af21b4e59c1984000000073729662be5a7c537b96060abbaeaa7e53e1c37b4578787d62d6d26905eb77ad6547011535b790a75d21b77bde1641b0ab15bb5f4569ec7dc7bdcce43b007a19 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301e08b064c7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2352 2244 iexplore.exe 28 PID 2244 wrote to memory of 2352 2244 iexplore.exe 28 PID 2244 wrote to memory of 2352 2244 iexplore.exe 28 PID 2244 wrote to memory of 2352 2244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\102f94b61b852cd8420b4f62b47c2f4d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da5d9b4b88edc31d6d36472fc4c36380
SHA16c3daedb728cd15db4bfed022f8ed7956124e1ff
SHA2566a46cffeb8aa47a5185af72cd105007933edf7f3034eeb0f6cc75bec551f2e29
SHA512e709994bec71fcf000defe23813fde6560c252b62721a0b4248cea12825019e906e45fbdf45fed854284ec3d8fa94e0d9fcfd582d4de41f0a6717456834ec9b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fa65abddafe9f5ab3a6bfd8a48d1de7
SHA12294ed81cdfc962d11390f6fb02c3f03a615c0bd
SHA256b102794de81b3ddfe5f6af185b144f93704b0932a64033a9b1a4bb03447e9267
SHA51230a6c673fa80a1150b8686678de37cde576b6fc68fe835d4b551ea7d06a3348fac33f4f430035341bf540f686cb913846b3dd40b030572845561b6189915c015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54db6eca0b7eb794ad4de860f61a52b90
SHA1117d9d9594889c4799ce0d81fe78768710a18c8f
SHA25659389adefbc8bfa14dee05dcb47ac8cbcb6de2d0754ef8a8318d3ae9fea878e4
SHA5120341ebf6364bdaee1bfdede3beef5e3b478bcbfb4e7c8a928dd4b3e0b161d842ed962a1c11e42d05d28233c4d1760f42a2772a18ff55621857179326add35a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557e0a1f053fce1c64c4a92eb4337cfc3
SHA1d89198f2a331233e9ae50ccb3cf5a6b0ae1af69b
SHA2560c0c6f5c0e951ca899bef92fe3a0752ecef0d16a287e8e4f78dd5a146e7b9bf0
SHA512806376522bcc526d111d02b8d90cb390151f32962a1ee1b7ca3691a4c2f290258f7880b26bc16e00e2bf103a32b098a79fc6595e98dbe1634e751274d2ff7f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba5b1d09242657a5f67f87208774519f
SHA14bab19e4cc2c3e6cf6dc209b386635dc1b635d0a
SHA2560c913c0e7c0ffb3265bec287c5a17cbd2871c991408c2b5552d4e63227fca761
SHA51234334c6cc56309c765a03461ddeff4fe72731f849b3ce080994d04f32d652c15af02763499067562508e55d92c8d2e622aa17797a3d77f660302d64fa5a93171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51100e9915b31db6b53c72e95ab862826
SHA152583471c702645c482ba1867259b54b3070328f
SHA256dc73f148ab955408db7f881f3d16a21925ae3dc2157cea0da9f005d73743d6b5
SHA51215f3db4da77bb2daf494d0254c1b08e116d0bd52ced9ab17ec85f29d3c1dde178b32735d8bc0353e235d68b3e175ab2cc4d504a056213b5e5c108ca7725f20d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff6e830ceec260d0088b2a22839171b5
SHA160db3afbcfce326152fdb87d34d69276d159309b
SHA256449e0ae115a85e8af0fc8f42f4518b7538e1cacc04bb25fdc1be9b108d312847
SHA5128ea1a06f2d0aa28807fd97f962b33d8e21bf201f1a03f3c67bd6b8c84809fdf5f035764babb194da4d361ac1ebd414a79f209f8da9479f8fe8f69800a825c098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb31bb03eb6cf06d38ac61e37b00e95c
SHA1a1ace3541ad61e9e01efc9319cb824260b618641
SHA25637a170c18e15bddb14aea5b39edc775461fab098b53c942b258de41311c01bf7
SHA512af8bd5338d11e09b95fd4b0ff966902de64a7f2fec54fc66ce0efe3cdf95d689a959f17b21673f146a1d8e549ea0ab7be9889cb19b96aee9d39203c62bcba31b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4d6615a01a07fef5f0f0a88040977e9
SHA1ed7389945576a40e57ae7d466add311a4c8aeac7
SHA256373c07d81bae7f5bcb6ab21ccd47647fcd2eba09d485d42a934a777896230a5e
SHA5122d6a2f5214ffb4a38751111e3d9f836e6ff467884084f699831d6e2dc55c7d49426d8ac926dea32017d6d5ec7ffc57bb8d77c37117e5e74cc4920523cfde9c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591299f350e5208f55c75473291d722bc
SHA13dcacb94489de78b7ee673068626741e419d5687
SHA256e533e3e6cd81a808ae911028cb996363078b5a84ab63da79cf26c7efc47d3d15
SHA5129be7618481b492b281f403c450c5d27d77651abfa8359793effb3ebf4df7375f46ed47cf49ec8db7950d362f86968db5677d4a5a8bbf2b98590262b79e135178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548d4bfb6bd1794c1cbd8951e4c9a3a2d
SHA15265ec2ec4eb5c7adc3f494fb57f70ea466146a6
SHA2565866dbc9b8eabd879acd589da83ee95c86a5e8a16c735d9ef5e206872407bdf7
SHA5120039076500707ab741dc01cb11934b3344a30cedb0af90b9ce587cf214cae256ae09da9beeb24bb8a2ebc147d8ec0fdd1cbcd0b9dec4af21f82f712234b06270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50434b7fbd86422aafe3cc946453125be
SHA1e596f29992eab519b39bb600707c2880e0200f82
SHA256daa0508fd40747a6222a9c5e74d41c2f4c6d5af56259db42e2ac9023265626a6
SHA512285ce38f4d75abf49d044c1b3e694d0d48dd74d37bf509d397cc14303948e45736b44592fcfaba6acc2c5ff9baa498cb55256d2f77b649fc5e11e6f1e8c5f98f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526eed68349d6f896d86156e04f3fbc96
SHA14696e43cba0714d4348e00236164350a29d1cb71
SHA2565d633c2a9539a8f76fc16449b07093d7096146a0b87a085b396ab5e724068d4b
SHA512b2e33b08ea1f74c0d94041f05d47d91d793697d7b5d107a1437df7333d6c18782f2e380b138dc15bdd4843ff7b3c321eeb558111fdc956ec1c74cfe504950298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543160782d9ef87048dd5f82dd9cf3d6
SHA18954266129b01ba4510a53bffa45b2261f7ac2df
SHA256634d956eee858724de091176783eeeef2828783cb30442926c8b9682743bba82
SHA51241753ed33fbdc64508544e67ba83293fc28cb49e53e36d6f420eba736a5198288bf0b834a08b683db7ddfd7c9aef81c97da3b4e575b979805857bf64335199a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef43126b3112ec30b80aafd10c519b33
SHA1b3a4094d75747c65349205cf2f8e5dcf1fb46097
SHA256d1ce6014cf45947d8f3d2e7cb110d5a245b472a6daebb30fc2bb0a2d7b1ba1f6
SHA512cd70eca2a43c86614b4335bd143934ba07478b1d6858add68ef419ddbcce9605bee0cb821b8d793924a23e5d059203333cc8bdb493eb1a21e0ae8410da660747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5311d818db5a45eee1ab89ca5ba42dffc
SHA146a0433bf42f767ef3b8d0bdb71582e2310a3233
SHA25623ec19371153d552fa2476e748716436a27244908595131be63db5cb0c128e22
SHA51269ee86bcf20ec9a791bcb28bc77f3af6c127fcfad6a330e8c65e3afd6ee7715b78bd2e5c51b0a8361b9873d3ea92b1ef8dee65d0d62317ecdd5e0df692bf329a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5669982a4135a383e60df4c77d8822b3d
SHA1ddd865a97711f142443260b44e1b520e4362dacf
SHA25658e6dc3178b79a0570da2ebef8b692c642419e3037bf4b24cfcb1f8d4932892b
SHA512a84a92d34d8917c588b3165087377e37e8c84924219f2102a094923a62a3f606567c7c61fde00ba1d9a94108964cae90391013170bf43b921ee9d10f8249f8aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8cce109b33bf835fa8d05f7957eaa08
SHA110ba9895aaed4f608935e9483d42c8c4042c4732
SHA256077aa31c9f2c56133f0862cafa6f9e9b0e0142679ddf305a1eeda50bc56e97a3
SHA512efe52396af832d9a0890dc3a07180982a1a3984d570b1db696182b0c6533c0fcf072563708ecd1a1a2753b9bc0540e996f25e65e5909515c4c6d57d7dda2a7ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4a536d38261f2c8c6325d7b6d410291
SHA129e4e846b994b80d7fb98e8e0e3fa9d6d2b2c09f
SHA256c45e326b79f910ae20bd699833f81b9c66e1a8b0c55ca6eb1a9daf61fc9a0285
SHA512d6d69f8089c0ad77e9a22aecd079c92f96352ff2d6a3bf4584f0d67df5bf0b0cf24fe093fbd0604f5b57ba066a1e6c762deafac48bc49361895a4cd4cd0f2b25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58170e12643bed49135337a029626883e
SHA108a77906907b1d1d6d76dced22c0178de25bf0a9
SHA256427b2dd5b45c8e73f2863ae505d8496d350e6a6d5690ca5bd4942ce0d6d1fac6
SHA51225fa1588dd3f1fe3b11e6381a2da326dd2f93afaa87fd469db05a8f864b7e7af6ff54c331700106c401cddd714ee07f1629130adade0e6b08c2118ca25ac591c
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b