Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
14a2641102bdc41f14ab8786bac679c9_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
14a2641102bdc41f14ab8786bac679c9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
14a2641102bdc41f14ab8786bac679c9_JaffaCakes118.html
-
Size
6KB
-
MD5
14a2641102bdc41f14ab8786bac679c9
-
SHA1
4a03708a78ce87f8f6b8e18762153b4848015d46
-
SHA256
969298cfe3eef0569c473899d0a87772e65a5d1d01810ae9fb5b458bd6bc2db0
-
SHA512
6dc66ca39a7b75c1cce8e454ecd8fc5ba10a05a977c8a7a52e1fded65a8062a1e7554cd85db04f08ec840d68d73a09cfa0abc168541f8348d24c12fc220b7e87
-
SSDEEP
96:uzVs+ux777dLLY1k9o84d12ef7CSTUTZcEZ7ru7f:csz777dAYS/ub76f
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07dfc3948c8da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425623386" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{645FC701-343B-11EF-8144-CE80800B5EC6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000003dd623ba8394db11cff75065619b9da5214130059a306dac478897f8e05d6b9e000000000e8000000002000020000000fa558152cdb89f8743641cce69f6c42740a3c69ca9d11698a5af1ebfb2140f74200000002f92d01fd0e389c3f37f16c463ca592344aaf351df05ea984c149b955e1b5bed400000003eb3fe8274aa6e77e4e5e9eac12bbd0e7c1641e7c6453518ffb250181031834592bddfcac72e6f5aee1f88a781263c4b1def401566191597762162b8f204a2e3 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 1420 IEXPLORE.EXE 1420 IEXPLORE.EXE 1420 IEXPLORE.EXE 1420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1420 1688 iexplore.exe 28 PID 1688 wrote to memory of 1420 1688 iexplore.exe 28 PID 1688 wrote to memory of 1420 1688 iexplore.exe 28 PID 1688 wrote to memory of 1420 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14a2641102bdc41f14ab8786bac679c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cc0b4df8d1fc52c79df1693c4d6dceb
SHA1e624287b929893153fa3c8e8cff79289c23591bc
SHA256f16871b90d076c1a48d27d522168eca9f6eaa03b8820a87715c29bef26e94c44
SHA512cc265a40a591b1905cad21000d4d9ed5d28c67cbb0d8306a57cf3340f2c75525232c388d0e859d71a6fe7f0a577737535310226c5eec982400367a2ff1cd3bc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a43f8f449fdb4c5eaa9f423fcea1ba0a
SHA10dfcf23e1bd4186fcf40e19ab17e3e8a501deeba
SHA2566158f37a7d9da122bd763b24de0a5c0be845dab0b966a73b42e9580ef9ce95a2
SHA512778c0955a3100bb78a002adfe387c2dd9e954d805c36105f79ad38cd6bd7f3c28dde7d7a08ace2e44ccc23debdd090710bb947fb09e2244b7a4d609987428c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfbaabbfff20a0254e5fe5b3b307bd8d
SHA12e50243268dcb656246caa7cb14e01cccd07bb1c
SHA256c46a60c95356263aa829e0ef82819c91ccdf73b030997dc4f43de71fd2b10d3a
SHA51238bd02f015986b74488f63a84427da71fc95193497f844c8d733f2a768c2b4c4f3f3d071845ee3c19fa872836d0d5e27c01e629aa3dfe3e2f85404f7699b8b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589f9e8976a852debaab38afa603e93d6
SHA16832880e2ad945200755c608d363441a4e85ed8c
SHA256c72ed1459cf427f267edd91ad0a662943adb00e17152f49b1e3a685612a9b381
SHA512579ab6798108c94633e0ba734188ba7182140784f5f452db9d438793e0b490a0d036a01ab61112195c0a554b2d719f48ebf1e0e094c22a7ee8210570d9b602ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5090dad5bcdc269fb59e4a16acd439238
SHA1c65a3d5c032cf555b9b790f41ea5432975cf3b3c
SHA2560f7a6106ac03b69095656f7339ba9c1c97b9fe80d02d15de8b2f49f673a889ef
SHA5127ae6dc1c79e8f370ea65e13529a968df96ced0d0fb02fc68b7df025b358f96f5b3b5d6ec5f9a1b66be5971edb9aba7304a59c72c6a6df7373fc02b514f1289d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5996dd1b60429060f7744242b61f71844
SHA16b1b8a40631f7468584295e17de30ba38b7526cf
SHA2564535975dee1c7fc3469690e34f79fc9df608e088c896e093ed7e63dfb5e3e0bb
SHA512694588957d48dd07efd537d48ef896b0796a675e9495756d76ebb6c3855ed01ecc3da4eae364b448e592ca5129feb35f905b59b5a2c807cce4f418753b5f233b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c43f0b72fa8bd192b3f232ffc3a5d4e2
SHA1924a3bf0115430526acf34749c32cde9796bb6bb
SHA256a7312223f3abfd263399698348941a396233f8bc642e409b631e443c901705eb
SHA5125ac27708328a3d7d0e48675d1221a402f4fee5ad8cc36ea2c07cdb87f933ed9f111b5fe6401521e7ab38c3b29732c923e7718e6761457356875159e763171acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c84f19eed0ccf5869105636a45d80b3
SHA1d6e6e6dbb0a66239890592268c794d2de60382b1
SHA256eafab2e27d7b81d7ed51d309c293ced1117184d5547be6ea5352b38d44ed1620
SHA5125a3e868cee36bc44aa53aec99e6b2a3743db1cf367cacfaab2a14df963214ffa380cb394060681d17df2e8f3bb36303b59807570ddfe4de8a768b14566e577fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569706d2a48b64be1c1bb087995d60296
SHA166ec4e1ae73eba67eecadf8d932e755ba912347c
SHA25682ffb06a70007c24e9ebd88c50be809c1eb9de1922c61e849ba4573564bbc688
SHA512baf3ec058f64fb89fb0558c873fd0a628c5650850c3c43643a41e2a5823f6bcf6596efd345e194c285bf9ec5a0165f463d85804f66102d3526baab24cd6cc609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc2f8af645df0b3cbe067c3a7730b7d1
SHA14ab19d869739064b0a465b970f556ba3a83ece19
SHA256b76b445dcdff5a926ba83153d9a5476cb5043888a9e703f96698f04ea3b19a14
SHA5126fbfe634520694878fc2bb0b776e98744e3155055c146fac201e3cec014f51437343d71f2f33e6ff17069dd5165ee6259a49fa9528bfdd2875c1b4a82901cf72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f98a7add31138fee1f95d68c584dba5
SHA135dc482b74b7fe2a5da29d5065f954fea2314f37
SHA2564eac1d8425b80db7480ad138bf8ef5decf75d7efe01cb13d17aeb52dff207cc5
SHA512fa6763878c4b7a08d31626db51dae5830be68842acc25ed8a2e6f9c541b40b3af439522a9dfa64f1980651cbbe2d6429b603d3985154372ed9af6ec1d175f7d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cb1c9527fca2e53138701e3c9b8d353
SHA19c4378b3a99c153c7ee9e923e29ee6b8711d0193
SHA2566d069aa1c0bdede80b026eaa21d39ae55c94f6c33ef795ef5c0b4d37b78cea70
SHA51266a0f7b5447c7ecc76f352704c74966a1e01b41fa1414feb6e3f9e364b8ee075a2e3889b5f9bfedb55fe38bd4ccc754fc970d328758f3fb4dc08c662160a6c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5030752b576f8e14cc6b7c317ede60eeb
SHA118e1ab9ddaeb775e423fb4b4c7695bef7a508f67
SHA2563cf8b8e4c8396fda987c474718a5125ee34bf9e056f95c7c2791174764391eab
SHA5120ab1adcbd950d512500b4f1dda9f52d75ca13b93000e8a4c2d610087c4edbf79b0867991b4cc540507343347fbeda5d05150da3b4581293b56a3507f5e860196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a10b43f1ef1d40f5e760822ea700ed9
SHA1034fb0741365ea222b26b6c8e8d3ab86152f97a6
SHA256c996890a6c9b0f86891dd2b53c3282c2b45eba807107ddeddf6ce788628ae9a5
SHA512779c8695d1d5a811e33761a79aef10a4fb54a2e49216f341cff3d6731267b4a7a752832098ebec08d1b46223bc52e0189bd1f61716bb6dc562143301ef9f50da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c35231621a30b62d3eb2b3c99b74b8f
SHA1864869f467236afdee2a3778311b89a87087ceab
SHA25691024391ba5a35ff2580596c56d16f700f6acfaab09e0105a866db460a1582ba
SHA512a5597259095e8ca09623e1e1a01b04ba1da6e5aa8197460937c34a56fbb35e5d8b6c6adc09ad5829f9ecdcf86e59bad02545300f9bbe86288909e02995425ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ea0a725e4ac7840121e8531045a54f4
SHA1113bfe2a0a7d70b089ca638aad27c16ac13f8d61
SHA256ec779f57813014f1aacff10fea9cee291e35ad7e20c7835437a05b75fed239b6
SHA5120a8373b0ea1842df069b748664cdb3b051164933f9006112d7c7a8f90bb158088c6607bf8ba34c9c3bc04c5ffc229f11431ec6e947ad0e178d86f1e52899bdaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538c9f89ebb54e819555007f88e1bdcd2
SHA1279e2aac4cb3d211edd239531be73c78a4cf38c0
SHA2567b3ddc83891e0eaf8cc0f382e6c97bf625838eaf7fbb8236be782f69f3934d54
SHA512d2d0ef1e9abd5039fcfadfd5384ff15a51088e9d20190d018cf6bbfe9cc713133b1eae27376974ab5c49f8706f7c73cd4554965b16034200f80c70839ce97ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568f53479294b779d2881e879c2b84558
SHA1e0eb64561719e6e35c64cc8ec6d3b85ed4d402fe
SHA25625dab82eb039cf7d4e67d01578d681e533bbae8d897b685a6749467d6c9862d3
SHA512d0b43f1604ba55e2014aee32b755cbe1b1f826eaed7340540ecd542a45fa757c6e6ba8fc5055617082d98a5e95be2a8b24c61910119d9e00c560f7e70119a9cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f983f9f82f81224633c07250b724816f
SHA110e5c564ed357b57ca1f7d48495b5633bd19a4b7
SHA25617fd18e4af0646e4b62f7a3ea9b4da7734bcc1e04c9b5dddb23ec93c78690d9a
SHA512cc560b973da386c5b9adf4d7b7299b20234bda1a446219d4575fcea04c183ed3e6c0e9873afd30348aca9feb6623a14cf6b097bd12b5876cd320fa00785b5f56
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b