Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
159b9a9e3bf6409be432fdd2ebaf2dcf_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
159b9a9e3bf6409be432fdd2ebaf2dcf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
159b9a9e3bf6409be432fdd2ebaf2dcf_JaffaCakes118.html
-
Size
53KB
-
MD5
159b9a9e3bf6409be432fdd2ebaf2dcf
-
SHA1
edbb6e53a97a245f5562f3c21cc08f58c555983b
-
SHA256
406b01601e8a0a54798cb24f558fca475f98fe493a96c27866d0c518736ce89f
-
SHA512
217229a2aa64d5bbc5216d9a3e17363ed2e1e9f42d9195a8fda582e7793df326f5ca33252d8b8ccd4d434f351efbef81199398a3a6039736d91cdc2e5da951e2
-
SSDEEP
1536:CkgUiIakTqGivi+PyUGrunlYG63Nj+q5VyvR0w2AzTICbb8oL/t9M/dNwIUTDmD6:CkgUiIakTqGivi+PyUGrunlYG63Nj+qQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79506431-346D-11EF-BDE8-5214A1CF35EA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000001a8c85536c68d527605a0d476aa4b72fd0a3ee31f9bbfcf7a8305dcf7377678c000000000e800000000200002000000080f0907896618c3035763e576df8953196d10c2406a932715f176e9411e9487d2000000097ad177ae8beac37a8510922e93b33a577b7d1b1116e195ecea3161821d81c8540000000bf34cfcafe05b5720bf4b9987897f9bcde4eeb608cce08dda9d63c5dd7cb7152e6299a61d937013edc3cee4f0f82f8b9c40cd35d9cd3dcbf8faabd5262516635 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425644894" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0d8224f7ac8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1568 iexplore.exe 1568 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1568 wrote to memory of 2140 1568 iexplore.exe 28 PID 1568 wrote to memory of 2140 1568 iexplore.exe 28 PID 1568 wrote to memory of 2140 1568 iexplore.exe 28 PID 1568 wrote to memory of 2140 1568 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\159b9a9e3bf6409be432fdd2ebaf2dcf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1568 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e7ddfe60533f4e5a3d985a9b134b40
SHA17a63cdcab2b54df9cf05b85e5f40284dd812e334
SHA25601ad1fc5268c19095c947326a5bc9ca60b3f849f1d5814fd9a017e4eb6b43a71
SHA5127be00dee542b309bd13c717badfa6adcff2661c5eb11c0d644f824d3b588ee5eb851714efb9b8d15c49de9f49aed25f6e38e770b355e6dd3bc4e912072d06d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52beeb5664030505f2d81e08bf3d47590
SHA1f81a4cac0081d2a48a31c328946a4349d523a5b4
SHA2564f146fabdf0fd12185dca79be23b26d558b493dc43158e0ea665496fa705cb3e
SHA512ad1173d1d31f787f510666ea0ddb9cf2c88199b0429ff21a2d509668fa0946a4a879c9465d6dccf23bd638a4c15e9b99194dd511b40e133d63cd8b1ecaafa2d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b901c3479f081ae059e6cdc45fcef22b
SHA1d03fb38282933aafff5b5c415231ab0ac7f14237
SHA256a24a85ca9d8350dfe5caec0c41bca1bdf4da481718064a9f567ce94a0b20c57b
SHA5128e5a4be6eb489b331941d3d0009ec814fccd44e8ad501f8cec00b394bd712878e665439fd0c9aa54840be5aa435f7581baf9bccfe0bb08c2ce5e9e9b61352736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5103df12a3fc5d6184b985c214a288b8e
SHA1d4bf006af605a6e2a1adb8576ff1488229aefefb
SHA256d80ec4524f96b17a5e48a80205bbe33dc974ef100525ae05a3c0018d32f8cb28
SHA51295f03ffc8b00d00699dbd544e9d01f8fa929c035361afce049b019fe0d33cfd708416ead83ac96d07cf3563cdce5d1837523611dac8ceeb2ebbb01d0bfb2acb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab53ca254e3efc43692fbd7eae18084d
SHA18123d8e4d3ffa6bdd59151cc7e80b9927ffb7c35
SHA2566e248b9d90399f232aa996d3d24676e70317b46d1bfad876f42a3de92507dad5
SHA512353082c4101b7be48d9c59ebb3ddd91169a01193ea0badae071054068af824c271fb8e9375e313eca613f6608c405d70021c750c8662f109d711a77bfb4f96a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c650d1f3a12c95e911bfc75978f251bc
SHA12b433130a56274fce18b9c7403defd548e5beb3e
SHA2568d6341c71cfcb89812225a7f8d2d70534baa3f79f7011e1bfe2dade715f1e79e
SHA512e6969fe99d3d598eb191206efefba3fb75fce96f0174b3dd69f1fe9ce35eb4f431c9d5b452a5c49f4704dd27ad9537f269902af2abd98f170514337c6f2214af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd840a4fc57c58b9b9ad1c7e14ec24c5
SHA1b23d770c5dcf800b81caee5597e314641b987f1a
SHA256b6489d182ac8661d7d82053db3e3545662445547e8f985bffd97e6368d584341
SHA51253e2344931ebe5ae6447d0fef0582cc8da69eca9e228b63e0d422f05b2ff8d90f4e8560ff2b0b97d25f1be65810f31ea2960936114fa35d347b3d19b881e20a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59076d5be7af8a52a31c8ba1a5ed14489
SHA1ae7137e680487cc61b79acaa80a7fe262246c15e
SHA25621705fb57d5f64f3f7f54da8f32817f3207911e9b55920213dcd4e9b4e24f1cf
SHA512a3798035de921a6da6783eb83c887641061586404a022ce77bce07b0f5929801e9747e6a3bde3bacd93e11387d755d006daa74806e10a3620bec74853b7948a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cea10abede925e89ed459e5a92fd3325
SHA16dcc02beafd6a936a6986a7aa59c11675cec9fd3
SHA25641afd7fda4859a57266c34668c79689729d9f3d0df66445b08487e2316552288
SHA512f25623715495a2359910dc93584787ae4e0a918691f565b8211626bc93d974ff47011757fd56e9e33753809ec3ccaa02140cda757cd5be5cfe0914cba0270cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5444966464a3df8cfbbaaf46b99b88bd6
SHA15c8c3f1e15dfcddb2cb298d665f8e6e8d91b4982
SHA2567452b82ee6ca10d7fd4601780b48750e885dca30ddb49836e05a63b2cd2f03f2
SHA5129259afee59f3ecb43f207c73738797404896a1c8afc737db73fa21258882ff4d1680339e2b7d0524276c0bd56611da45e50924db380e9d795519a83a3c3868a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb893892fb521463e39752bb37c0cd69
SHA1667f822b4f8b84a6a01f9125b676d3c3fe0614a3
SHA25623c0c8bcf209f86fd84c578a3b5df170ef30c1e21c7734ad0d55b8e822879472
SHA51205c7e4704f65beb36cf18d3457fcf3527e9aebc9f157f30c55398ebfb665bd6ea965790fcddd6b2158b31657238f6d84396fdab4215ec5a144c80f7f2a8e1089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d3cfd54eb6e2183c9d912eba15ef4c
SHA1e1118151b2583575d3b39fac6bc1e844b852fea2
SHA256efb667230ab90f76a56767bc71846368c02dd997bbc30d789cbf440f4be98c34
SHA51230007dbcc47ff3134f1192b1b8248a887e2b8a753e04fa49a1bde63672a3177a110bcf3a145f9c4b68de683dde9487bf35727e5d9c4b0e2590e4dfaabaf86dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570cdebfa8d6d88696f1bf0906181d4f9
SHA12a5ef4d663dad06dc3ee2cd2f06aca210a90d404
SHA256c6961eb88c78877e2597bfc2bcba872e84c5b99a3cd65fa9aada1892853abefa
SHA512a93b770776e8257dcce6bff5b0c2a9f2177020c4fc575e2fdec84f1597e16e34ea40e4fb6d14b8dc5e22d510cb919eed15e18f7407054ae29d445e336e0165de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59656519868b5d523f7fe6c8f1eec5ff7
SHA1b7fcd7ad46ad0b3e15cd5473d91682c1b26988d0
SHA256a707c319874257f6685c3fea577f68dfafdfaabb33d25826fbf70cce344421b6
SHA512a04ea2c7d5508c9a51ca7646f6548dc0faef2180e9825ce856cbef8d76a29dd4a1f404aadd7719a98138593b1d74b2fd3936c58dff7e931bb4aa0d63f26bfd1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f264b3dd9548aaac0a8a03b0121d314
SHA189f805198d148917c1c626deb0e960085d23d6a1
SHA256bba75b4068f91d7f0d72b941138120439149d302208b5915f1f8f08459bc42eb
SHA512e36c2c28163fc178ac6b47b49d9b68124482828854df5bfae06318c537c5eaa022384c8c1d9a23b882b5e48f06f4d44b555a45986d012d462e2b20cd90d0ea7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb5332e3a2dd52c1972703be164ea067
SHA18aa13a454a25ec0ab3c15aaefb1067980d67bae5
SHA256fbd304cb7c86957b7014a9dea45fa6f81afc9d0af99c6453875f9053d52bfb6e
SHA5125f7a711cfc5a8ec8fe514e32e4292d080fe4991293967b869d744815d77b20b02ab8779bc61d13cdd6399315dbf93a86503e8535381e8180adefc61b3f5c04ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e35331bee7cebd86e874c368ff92685
SHA1cb56090db8f6701c5dc3a2a8de33de413f31380a
SHA2560b9902f639728b2b1514b8837da54e109f2e3121c4be8a2a24b0e0d178fc42c3
SHA5125319c2ffb881553e80ae9e13abc50e1071f40a50178a1b0c8d9a2b8efe09b245533f27bfac972f387073fc196cc44a73fc2c93db65eabafb1f2538165ba20a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8f88237fd655915d77fc35d3f89317d
SHA1fcabb8ad668d75419268c3b0140fb519d5a367ee
SHA256359a4f784e3d77b5dc33ae22024d3df3ecfa0b1f3dfa6a78f4d2eac49add05cb
SHA51243b0f14f51a7378d39a7b9e967fddce2ab9a3f0ee8e7321e687e901d1cdaff43732e52b2fe34917aebf6b6f6d33800e3d08bb9654ba3d9ece2f4c50b8d326b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cf9ece84bb1d12b30338b54eb200b78
SHA1060a6cd344b949d43729030b82598208fd94df63
SHA256af0d5a0ca8c48e94b383eb922d3b5f71c4c79281da1567901656b22fcbda5194
SHA512b16986aa61d04ac20f80539c828f99f7ade9fadd86387e55e6e62210cc4b40a8bc57b900792aa93d6dfcbd023908abeb4dd0c3aa6f3849eed43e848e092c4224
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FY3LN490\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b