Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 04:37
Static task
static1
Behavioral task
behavioral1
Sample
14b52ac5b9ffdac9a482c81780ce0ed9_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
14b52ac5b9ffdac9a482c81780ce0ed9_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
14b52ac5b9ffdac9a482c81780ce0ed9_JaffaCakes118.html
-
Size
87B
-
MD5
14b52ac5b9ffdac9a482c81780ce0ed9
-
SHA1
2a6dbb1ffcd3ace89b2d7c0ce9dd0e58ae94adde
-
SHA256
cd4379bdec5f956ad16e71bf3e58fc208dc7819d3461b571708aa3fff9cfe34c
-
SHA512
013a88126de7d3ec67716591babb445ccc493436014f3ae7dfb656dd146ae0cad9504d04e90624652f2f3a3997fc51b7e0eb4b441430d199ab4e35ebcd146d12
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09C4DFC1-343F-11EF-B848-DEDD52EED8E0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10cb91de4bc8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425624951" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000cfc14922fd812b37eb5d2d226cf3b70049bc729816e6ef9eca31636972846d9a000000000e8000000002000020000000476a2087caaf368288f39428633ee0885bc8c1d5ceba5e5482a6742965aab55c200000000e2ae2316cdd3a0f8d95d028f47c216d2e77883f049e145a54a582d9e832d0b14000000009c15b8472ecc9f66fc0d020ca2814fbb56595cfdeb79edfa0b7bf35116c3d80eedc7c186440080aaa925325613450e5c05ec9c981e5d603f2a565f67256538b iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1200 iexplore.exe 1200 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1200 wrote to memory of 3032 1200 iexplore.exe 28 PID 1200 wrote to memory of 3032 1200 iexplore.exe 28 PID 1200 wrote to memory of 3032 1200 iexplore.exe 28 PID 1200 wrote to memory of 3032 1200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14b52ac5b9ffdac9a482c81780ce0ed9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd70a7a369362ea9feeda61f8eb7ebf6
SHA1df89b8d65c56e19557a8b1cfed16840e8287e7bc
SHA25697229c2b07c4261c4b33ceabc8146c999fe597407260b8fbd102b5a22e4f6ab6
SHA512d42db24a952eb65745d5435af64ed968f9a0c5fe9267dc91f3f302c00aad9f685724280248f97e3fe59b8a99edf30cdbf553b166aa700e237edad91c548d7502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa8c96295e4021cd4af03ddb92de228d
SHA1f4f70457307c17b992cd398d0dbab74284db4548
SHA2563c680a2dc9b447887915d6479d4ac865998d58c10bffbfeb41d71761ce0ccd82
SHA5128300915dfeba5714b4b39bc700a341a0fee1785246186ab4ad1f8ec3d622d2911a10a6a61bd732782a8d93f5d324c1e2f76e2cc9cc238aa7c2b4224872580049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd4f050f15d7bbd08f5e525e6944943
SHA1fcee2d301283762b1bef70e559d65f8c2b5f0d76
SHA256034559b188ba3a4894be252b7af6237a617efa56c34827ac49997385e130b1d8
SHA5123f3ca20e9a8703dbdaf42aeadaee43402bf8169b906cc7f78e6dfe1d19b4b64d18964b974a5e141c470463b5b79a5e5ad66f2fc9ef1b986ce6904510d6ea1af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54945c181089b3c0f88203a77fb2b8ade
SHA15b07c241f12321621fa7de2bb4fa3a1d06ab784d
SHA256697a1ac450aafa196676903c0e8d478f09382b4bad53675923c90e609d224ded
SHA5128118ed1dcc7d7f9a45bb90326523d1c072a1c6dff853aaa874299985af9fa714164ec25a0d4863aec9a4910127a449436abc32e8c6d04d7282c7cdf00ae91182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5309e1c54e9fcb5992ff8d4064ec6616b
SHA1bec97bd55fee21fed1d7f434057e74a91de1d75c
SHA2563731d3d05668b6109da92eff0f4af4e08baedfa043f05871c700d682ea9f69fe
SHA512eac3886e63134f7af010d6346562a07c1715fc0c3a0bc19b546300de1e0b57fadf2f6255308f33311277aa11eb0affaa9b796d7c9b30d1b835888b4148018c2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aa4903ec781e4bfde85beca40659036
SHA1e145b37fd5273c5c09f0d2384b49caec510c92f5
SHA25681a3d788bb20bf96c3c015ce20a462c48bc7e3516b04c4b2a6bac2b1cf598d18
SHA51233866fa6a06e97f6810de2299c3ba02df7d83ed4731f985b6405bbd6180ef4e0d52243d444560f32917fcf50cfea8283ef4e65946b2dbb90310a66035bb22ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0ed9132cb65b47fd97d598b012848ac
SHA1637bbd5da333eddfd1db2dbe228af7cfa2a651a3
SHA2560e7a2658d6530953d4b796261e1cbffa2f402d16454afb67bb5045deeb957d19
SHA51263324215b770759586f4a9256330ad65fe685651c462b666301c43dc69a6b9aff1b061e663a6fa47e988c266497edd6f4eaccac47229ed0bf6a0640d99f09289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561f03ecf453a2afd43f347cd0f893fc0
SHA129c0a28e153552e14dad43d037c4902c748f3b18
SHA256255d010a6996c696fc50c213c81a56de3cc6b1efef66e16b6364e67d2b0649ac
SHA512d04a450b480bd4cb9b8b48bad7e9802212b6c8363ad5b12004d2c263a9db8ac838e1ccf303a3d2285e9513f3fce009987fe55b58ef1b884fdc405e6cd42d3535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516a2d2618f9ac33aa864ae7da722d15d
SHA1bbfe93669dfb72af8c47313287583b54b99e3433
SHA2562ad4e1b64188a550f88d647a52cce7dfbda84004282cd676fbfca8a013f797e7
SHA512a9c8bc583d8b133bff8e3d4fa8e251602a239d34bf521e568983f87f9db0ed2d600d37f31ecc4eebea40cf97c7e607d077a51d838e67a0bd20bdade640ecd2f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f8369256642f4448bfa730c238e038b
SHA146b68d1bd9b4dd3a14c24556584e0e07362d1e41
SHA25620f4a26abc40d80cc8b5d45ff5c64ee1c28a252d708092745eba290424a8ccc8
SHA512db79ee2a28a082cbdfc34ccfe60d9e77ce6a3d593d5aa70b5ef343ab12d3d8883d3159f23548a11e16ab5de55bd15f9d863919a4f331400aa319b4ce6cfe71e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d36ebe6dfc4abc01c40e8e63d24379e
SHA18d6ac7e4dbc63eeb3ca371452019274ba26c6618
SHA2564fda0bfe63a28380ba688550171bafc80f08ff546e12d294873740f028b8fead
SHA51286d4755090d0b67ec61f95e3f7797010cfb7c19c21fa20afc8177239c4d514611594bbaa617df83f6eb6e898c9680dde87d3cd91c7883ab1ac085bc7d25ae7f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551a9ef1e54bad4764979f376b44cb1ef
SHA19d63565d983fc0a1e9bd67bb89fb6faa07522e79
SHA2565b059eb5ce52bf3267c4740412875953efe4b220aa8e0e90d08eed436c7a38ed
SHA512faff9da6a5c3e1908a02a36bfef00a5296b1a640966a15f9940e8d870839b85d72ec6df5496ebbae112b395d9f313afa54c334907e6756d490b1f6cca0844055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a98e2644b4390eb2a41a4550cf4481e0
SHA142d4375931a6ebe173d689ed8c1e36f47868c617
SHA2563c33107aaa98fdcc56922ec2018918643fa41a10f83b312c19c5797ea499696f
SHA512603072f065af01816ef121345181aeeabf8a119bf40a0bff4a85b59b888076df5b0f1a85189c05a8db4d7b0c67c91c25427fe58c56ea24b717a130aa7a1c7946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58442b1406dc00de4bcbfeb0d5b3461c8
SHA1e8bce71449a139be01ea9e031c0491e9be76d5ba
SHA2565f62f07e9fa4788860da6c3e06b64d8a562e6967ab30217e242445adea6dfa9e
SHA51236a7b24a6930717a1162565804b0ef8dd06d0ea6ce482fb70453427ef99f05792bbac5eb89f2b3c4652737ffa90edd3965a688b4d2dea2535b344ddbad88d492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c96d3cc2e402cf13223cf580d09931c
SHA16f3e26e02efdc1b1a8109faf92b7292e0c539936
SHA2569fbfd36bea00487481c977e903e23aa43b4308ace88ded8a6ae95adab79c7402
SHA5122ba2982f224ba9873bb9ce38dc9042e77ffc23a3c345a8d15aed7d9d21e10946f8d31f8f71c94e0b4d87ed6583da69e5d513b01a5cc9b9652036058ba40548c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3aeac35f8811bb85d735e08e31f2eac
SHA12616d58ce0e02d4d53c85e7d0027e161973e2630
SHA256018c6047657c77d2b495dae42417d0a9eafb4fac8307a675228d41199918bc6d
SHA512eef91284e62532c9a583222ad9b427a086889f51b52cbaa8dedce8eb7b5382bb2243ac45edbfcc72bcd947d699a9b1dccfa0629de48cba0e42dbe53cfe876658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593ee935b0eba334ef693b7707fabbb4a
SHA1747a5e3f8026d8224837843504770a69f15c2e2c
SHA256f69c95cf5520dc755550795a5b8e76494e5eb2316037d7c8d3a3f8e7c9d76d37
SHA512106d7af15dbab6d19004204d9e7fdf52670b3f3fe90246bf75c0121e7981f2b7a7e4e1fd91ee6acf23f790ce062336ce42ac9e205d264949e33bb49da25e297e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e49dec0f30c7df911234ebd52f10a5c7
SHA12879c06f839f07002c1972ae2be41ae5696cc6a8
SHA25697545de2e52f977324fd9852469765881453130d414d8517297aee9dd55fe8c7
SHA51223cda2a724dd0718046b4d130d07238c7b0070e6763fe6a59432b2e6e5726ea9770f7c7bbc6e93a530059cab565bdde9a3feddae3b16e1115106ef57f58a21cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575eb017eb7f60aff48725451870bac57
SHA1794b88705fceb204366815ca50482c962cf2467f
SHA256e5608d32adc0df0fa65892a3f7adc9cd55af28cb2db77820b5a4298c794f3161
SHA51254903f04c6d98b4bb9b674bfde13a52ae488003f995714302184f20e5c71590200cfcbf0b15212a9ca8b2c106883038f35c3eb566e2f87dc56ab207841eb1cee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5521b6dcac501c3f8d194d3ca8b08af63
SHA132524de68f63de67781f857600e52a87b3c0899a
SHA25693927b06897962e9174ec8df6fc26f305c1dea1aa8c280a97fce6ca29c9562bd
SHA5121388036aee39cb2a920208ca3dae68242e7741605f2ea9db634bb5fb43487655f78ce8a287c5a77f1b1dfac74d364a61a0c81963ef1945f1507e3852edadc8c5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b