Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 21:42
Static task
static1
Behavioral task
behavioral1
Sample
17a2c9dc988040fb5a8d3152636dca40_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
17a2c9dc988040fb5a8d3152636dca40_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
17a2c9dc988040fb5a8d3152636dca40_JaffaCakes118.html
-
Size
53KB
-
MD5
17a2c9dc988040fb5a8d3152636dca40
-
SHA1
c3207ef23c4346d3726a5f31b09db4e8262c6973
-
SHA256
1b9cfc81d121c44b766ed72623cbfffc3f6272669412b143977ac57fdd676300
-
SHA512
336d2ff6efa9ca716c991bf5395e733eb51176ac018d1332a9c7d415c4b47c9bfb380a23eb614713e6e2ec29a507359cde0b8d1fa28090fd9791fd6c0b93f0d3
-
SSDEEP
1536:CkgUiIakTqGivi+PyUSrunlY4O63Nj+q5Vy0R0w2AzTICbbdohy/t9M/dNwIUTDc:CkgUiIakTqGivi+PyUSrunlYn63Nj+q0
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb810000000002000000000010660000000100002000000060440e4e1ac53839e66b45c0540184ffaa93532fda232d1839dc9a05d8108374000000000e8000000002000020000000819a389c5620cbcf6c47bc4bc9b5d50ddc2ae810f77bd3fc918c61942a1a36e720000000c05b4fc7f192bb7b8ba9a03229483000a66e30757b98ce09f85de52e75c08d914000000098d54b388d7df75333c8c403d142fad6870ee01f1a67acc5047fba3784941c5012ffe853353c40aa17c2d61993598bdc957e194e8e3078d2555eca590655c053 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d025ddeddac8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425686394" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{18119701-34CE-11EF-B9DB-4A2B752F9250} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1512 1936 iexplore.exe 28 PID 1936 wrote to memory of 1512 1936 iexplore.exe 28 PID 1936 wrote to memory of 1512 1936 iexplore.exe 28 PID 1936 wrote to memory of 1512 1936 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\17a2c9dc988040fb5a8d3152636dca40_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5895352e67e3f3a3f8175060a7e9acfd7
SHA17d6f75dc90386a60ccc2081305aaedd51b980263
SHA256c92a70cf505c53a4296c3b5b3432c78edd39dcfef3062c0dd409f81aad4b93e6
SHA512535671fbcb8aa2f5262be26bdc2b6e452b82aa27b04ebccf7750b64d22fd8c9a6fd89aedb7fee4622d5f8ed168399a107291c67674748d6256071d97977a1329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa26eaf3e40936ef406585b9d6b5160e
SHA11c2e7db84bf609733e0eee5c336dac1092de5081
SHA256ed8ea3216b98eb15ef9fc11ffc5739ab443e17260046eb82083d55f7a817eacd
SHA512587d31464624476fddb5f947a8b5e18aa3f1b89cda98f05800c8c8c53ce35eab3582107d8384e53f31c71bc349aa202a2e01ac2c401da27e8bf4c5813f951b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5771b42c6674284390b9ebf31c6bee769
SHA1d86128384722ab4bfac35eafe091f9cf46387524
SHA25619bbf129714bfbd755097f5d2be9fd6dc09a6b471bd5b16ce978c9c781db7122
SHA512e6a2d42fd319f7c8e1d8022f4f9c4a329362adec0bd5a9588d2a337b6c2572198b92671837360eada6990db7b6cd74e4f55789e0c9d48df48a1e90e273a5fb03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c38c32fee372fbaf7acabf3efab2a64
SHA141f232c12dd164c896b12abfaa4830949c5559cd
SHA256a35ef10d4dd19332216e46e7e166cd812e9c94147b5f5d198cefcb7b6910294c
SHA512f5fdc3f1b967bbc0a17af67f1b2f4dbe2c7c094b40ed53ee1e9215f5ab8cd3c96ade5bfdb4dce5ac95643826c8bc515d2c7fc6c6ae7b4f217c43cc219269a80d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c0ddf74d5ea9262ce69c02c5a41b90c
SHA179eff0c0867e6f65339450edfc859cf9ae0026af
SHA25613164e8b78031d5c2ef6feaaf077c1eb229dd805f83c00e8f911801111e4f89e
SHA5121c27c2a9e7c931b26d2ce13c5f2598b09cebacd70063833e43c029cf5baaf6d00b4269da65254b43a980cba149e033ed42ac6b5a8ded310c33c2f2495bee8e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579bcb27787148181f501e71f006f134b
SHA187dcd51d39f7ab13ea7bbcd40f60c204b5324044
SHA256c945f11b252ede8e1d683e8ace5705f54202acfe3cc7bac18e16613c05d0862c
SHA51226ad08ca9d9baacaa562c720feb9f16369ee1d425de79bfdcd64db658447e2de5c289e59a3fbfeba1bf90fa78f105040fd98fbfaacc1719319731b194052f2dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b93030bb351ce942c28accba2be92ee6
SHA161517ed92aea0a41bd756e1275ee733b26d10543
SHA2564165da9ed04da3e9a6b3b25b30b83e23b5fe11f7a1e2d8ef753cae6a49281465
SHA5128d9eacc874404554e9447d2c5fa2a3ce7fec37af00d1869556526feaadb38ad70e6021af49de11e8346b764cfc246ea7c66ff4337a5fa08d16a61a8c7c72a231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d46b86df67da2e4d5936c86b78e6a6bd
SHA199f0496906ff9d019970f82dd75bcdac2dcdc077
SHA256f23e3e43a8aac37fc373146cf6e288d595600af23ab512f39b2da6e8af788ff6
SHA5123060f194d09fb0a1f8676ff2f3e66fb996ab9da34013ad1c72e1adac6be8b464cac0dc16791f3934703a40ef084ae9f01fa1fff93e00e006a706f5d5cbbc36fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568a9e3d5ff798c98178236bb9ad43a60
SHA1a8ea0aff5cdbee1874f89b6279c16f0133f401a3
SHA25678f679c5248b3dbadf41245887273976b3fab7465767da3d68b1e88ab746ede6
SHA512be02345b51bc96e1dd45370a71f4ae9198ad72d442d2710b70a5426ce6bf2a4782da02a2e1bd8fa03c638be84aeac67e4f33bd6791905caef1f6c80e76b6ced1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5015cf77e6b4b040037b59270b0b293ba
SHA10fddde5ad4e556c83c17f202a06df3f3fe3c3b1f
SHA2565dd8c5bcc882a0d972a97ff36bea91f10914747d2d9afac2b9fb476983fbeb4c
SHA5126754096c6268ee8ced2ea1f28afb425f6f3c7fe419a9a74146459bdb7ccd4ec322f58a1a44cc9f57ac696838ed3c0e057c54d524f19f02b8a5a96882d3488eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fd7a038ba8d88b754b37dc71432ae1e
SHA1dcb24ac805c17ae59df7ac9142f899cb1ce5fda9
SHA2563c41d290c8c54c0e7441f7a38512e2e33fa5eb8dbc3aed4806d40b2a6bf0503c
SHA51235fdafceb9c7c517ae51e32374215c911b95171decec8bdcbe43196150da4bfd9274f341bbf45bdfbe6628bca5bbe2641f6d80add2b5be063ffa4c2b4445816d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc599b1b91111eb626ea28292ffdddb3
SHA114a9d6282b5360c066fd4f29fba3d2a6e198fbba
SHA2567ea2a61f221a4e31e19f2f3daa10d724bec701035428b7348504b79758c4fdec
SHA512ebff679df2f3411d55096894f203adcad851b38ecacc8e1fbf97787b586159a9718886bd92133031c6474bc78b2337ff17a21b578c69cd43ed0d7e82aec09e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c340455fcffb3893a2164eb33b9164ce
SHA16c8d7b9f30ccd3136124f91c5aa293d3cff15f54
SHA25618045f4d79c5bbe19b39a9a5219a3aa92820af759cad6047e294d8a047b1e1a0
SHA512c6723a7422d79dc27c5ca98fc668e3539781c6af01d2beb041894d058556ca114458c967f7269542751b7c03f077c263c9c15050f13896efbc59923949deeca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e79b24f85aad976321e1ccb316a6d375
SHA13a202f42193453e4d857ea38edfa7b5b564d77bb
SHA2567deb7fe631aea5324b7ed030d86c98b18fdf5981ac30937ada3a20da526ac5b0
SHA5124c677248754557ef3506af31a95bd64b7833187aeca819c7f91c987b677c5bf76681597e8ac9770a3ef05fdccc22675bcfe4d092c8a1931dc1737064db3af9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052c213177645f1682631a349499f614
SHA1468ca554ffa250321375224e02e64e0a4e0f21c0
SHA256df048bf71b9da80658fba182dda2f0cb17aa86b12c7af110212f5f24da286109
SHA5123a04088ebd41d1f8e5f8ed1b4d89571936c702a296eaf71cb4864c1d734df4eadb01e725d8b26aa5e6f19a19de95fe774b97dda27afe1fa9808ed43a0197f644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e1b3a4f438ebc418698e0ba5b88d620
SHA1c09458bb8ac11e71cac182d7f592c87cf2821bbc
SHA25683cd248e4302e4cef5cdd062aceb1ad17a6fb7ba6e375f7e66580b797081b75f
SHA512e07832cc51f7c674ee1eef9c4a0bad07de4b120b6eba3588c0792cdb55770a125d2062c397a45fdb3b1ed31accf3c663e8ea1547ad416875d14df4d359817c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c4ad2209a4d912d0ac322069fe026f7
SHA1bed6ff4dc6978c6d06d664493e1b8c7a58cc359d
SHA2569db006f553b1f8f19f5430e1645f1772f46041d486b56ecf7433ca7ee7d1db2c
SHA512648c1b513b253d07db7dbfadb0c12355e79cba4cf9ba5d1114b14cd4c378d19041825c0092497b159c0eb21953bfbd59d5c2a94ce4e8870c095964777070aef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a619de46a783c45ee040beb30137d79d
SHA1090a87f8d2fef129855723085bfbd386dbf3e41b
SHA2566d2a2f6cbef95bc798b56f6dc1845c12870e38b79da0cb87549ce568e3367f62
SHA5128990d1c49a1760a6568c9894524957b8b00ce07b576ec96b798123005696d6acd9375ada273c11832634e0ad5ef0ba223035ee4b03e54d263eab8c7116f26708
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FY3LN490\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b