Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 17:06
Static task
static1
Behavioral task
behavioral1
Sample
16cc9f69af367d1baf3347d53b387b28_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
16cc9f69af367d1baf3347d53b387b28_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
16cc9f69af367d1baf3347d53b387b28_JaffaCakes118.html
-
Size
53KB
-
MD5
16cc9f69af367d1baf3347d53b387b28
-
SHA1
1fcad02eeab82041daf74a400d3be378bb718b4d
-
SHA256
197833e9bfca39a7e42da1fb0218443efb9f33778428c29ad35296a28571af4d
-
SHA512
1278091300ee35cee7373cfed02348d0e8a0fd26e4c903e82990155855c5dfcaef4f519404d52a6d63f0a9614f9d1d1c375b97265613be9aefedaf9f91e6ae64
-
SSDEEP
1536:CkgUiIakTqGivi+PyUFrunlYk63Nj+q5VyvR0w2AzTICbbBol/t9M/dNwIUEDmDi:CkgUiIakTqGivi+PyUFrunlYk63Nj+qI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9277EB11-34A7-11EF-AAAD-627D7EE66EFE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d53968b4c8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425669847" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000002f5c62abf1728c4b2f6a0cfd9c3b5fc83a82c77d3859728f016732558dad3295000000000e80000000020000200000006e2fd7255cd37ce91a37dbf1e908fd1b044e07eec2a9f83cdfd869d2bc4c6d9120000000429bbdd0823345d82ffa0e7b07ed61204cbc8a7c195c0c63308d6743a0708edb400000000756977403e9b563004a7491341abe8bdbdb840b406217bab0d8d416bbe2588d093e90340bc97d809e8a07d997815f31b1111e065f685afd04716a1148c8f520 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1548 iexplore.exe 1548 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2304 1548 iexplore.exe 28 PID 1548 wrote to memory of 2304 1548 iexplore.exe 28 PID 1548 wrote to memory of 2304 1548 iexplore.exe 28 PID 1548 wrote to memory of 2304 1548 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16cc9f69af367d1baf3347d53b387b28_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1548 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561aea7c68b219dec906f2bdc9fe2590e
SHA115d6ec2b3b218200b6a0c9df68a2778aac529eb5
SHA2564c929a91ae158a85ca0dd3b905fdc5677e4a4b8724b85830ede29fdbbacb492f
SHA512a508259e681423bfe370ce0da0ecfa542174ee6d2296c873dcde7dd976dd5278e97c5badae585dbff5706b3bf2045adbb535ac1ec15f161a65571d99f13db67e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f94afb1083a281642ca9050b029d592c
SHA19715306f15a6d20ea5e3fe00499aebe3465d3765
SHA256659805f01f130e6fa86c4b2efdfedf3d075156015177724f69a82f337bf84607
SHA51217502b38dbfe185730e97208e5bd38df37c25d76d8df2778351ab447cb7eb0763528fc037905d416d2e107ee7c08b5afa756e9410af3cc61608d9009bc0adf06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51af30edb7d65438d48541a49ef101605
SHA1cf95bcddecd6aab6f341263fe065348b3b3c4bcf
SHA256770ee3ce248fd8f43c2e820d4929ded49767d33f1a365e17f60e9c198dbf67ff
SHA512a8abf699ce63aff46743d5a5777ec0c252ed947cb884c0a971f6673828da33511fc23a51bdbcadcfe29ce5f62eb7cd90856eba53c4cb46f70201abdf52119eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f1d73b41406f878ab3f729ca44b17f7
SHA1b56cf1b9a49572feaa7c79189a704c2a0bb76641
SHA25661d5a0b8495416bc735388731fe7ffecfa4c74ddbfc71847cf5807c8fc031be4
SHA5124bb89030c2125059142249559ebc942ef3aa9509bb809bff851a5c7cf9cd72992ad7c9a69bf165a1fa1260585c401f5fcb96aeae16450b84e6f66a74c41a2b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9303e70a39c5fd9894da9bc62eeed69
SHA1a7fc2c446173310d5f2f719f2c98fc981c1c0fed
SHA256792e2508ae3d2b1bca23549acfc2aafbe8012dd1c82d3a5eaa2e430774b74670
SHA5120a9ba2e105d31dcb67945e004d315f7c9d4f0ba753b2fca448f8ef021dcadf50bb8496f81a38b095144ee776a95b126aa858954f77544364a51dd6d94877e20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a9d6629be68d116fd972cb12987a8d2
SHA1ca011666c61c998c48f40452cbe651e6e0e973f8
SHA2568bb09cffcd2f1fcd7ac4fdb621b630015a03a6ab324d9aef731a39002626aafd
SHA51244decf3762a5f08ff4770318dd8b1c79f069af04e754d26d35ffc509bddeea244655b86f9b2e8775c90fd954d119548667d6e4e3977c8267d784609d3d90f18b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505d755bf0774d7e307aef651133076a8
SHA13c5a0b2e585991357912f1dee1af160b4e2d175c
SHA2568747ebfe89b449f3dce638c930949c4428462e6e0bbdef6e9d1017837b8a0fdb
SHA5126dfadf765f717a40be1ce42df6b434a25a8b6c609bfc604d7fd14bd958a6ae1b229a24dbeeda283b8416d122cf66ff8d84e0b09539529f4ffd670bb2278bc6b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567ba105a899078bbe6f28ac3d02424d1
SHA1f2f3738c333329b01e5b2041fc0f8e8eeadb9af2
SHA256ede9f4d866b6e0d83c423e618c45b2676790542021ea651b2e7c02ec5ffcbc83
SHA5128be117bff815f557fec00334e881993e51e1baa83c9a5f2a5fe7bde9c3d5d8a0d98524fa87f43ba7fd4bff8c909c23be946558013e632eff4f376df876c11ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca76c24e0a102d75b55494f46fc0da99
SHA1257af8db4bee75e830a85258ed8ae3f437d8aa4f
SHA256b10202ca8908ac986241aef0bf1f689d102da87c7fcc6199ef48815473a6d1aa
SHA512122c2cde98e9b4443d3a396de0efcfa4ef7df8fb7f5f828b20c3f3d3357a80361ecca9043fe34321ecfe9f480eba239619af3cdb249635ce438330601ce805ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5007a3c34ba0f013009db81f53c9c69d5
SHA1eba86a36d26fe30728038e7094cd0e9d602d5bff
SHA256878f47d84dfa0317034f0b7a7a155e0b56103809e16ff0b31c7a39d1214abeb2
SHA5125ae4fef1b3ac4bc9cc5308e1164ac585e8f3ccd3f090480a0b92f6d79a3f569005204de7786318539a2b2f29a09ffa002a5efc39d7304de0aec3e784d02f1a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d43d3b1c288625536aa4d2a06ae40c
SHA1fc0c122d1bd82e7ce5a534f38821953a3cd7997d
SHA256381227d8e82bd7b61cd3c9c9bb7761dbd7fee20747f7543a2b00b035b172d52a
SHA512b5f277d8e38aba7384817c69a4dce070094b9e82075cfd7194f2f901a73a2de3cee05636360157194cd05e3c36960a59826e28fe77bd33b284c30e9c79d3de3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e735e6f15fb9cbc5f5466f7152e8613f
SHA1a38838a0143c2a406f58085041203018f825df81
SHA256223168d689c96d78a09a839819d8542b617abec6a40bd92975cd4611bfaf69b5
SHA5126cbf2ad33575754ecde7c9e2440cef15a770264920ace8985279e81d9e6b4f670691a9fb8a118e0ebfda15b2c2a12445b3fec511e9eb6d32f9032fc4702e1c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b4e75330a844189b68ff47dd5809b84
SHA1702b526970b921a361b02cc9960fd6655617ccfe
SHA256a869406e5769905bfc4bd73d21fe832cfb96d5dbd770bc8c8234a3ef8eb3f6da
SHA5120f2d59489a0248c74fd736a34f52be45a3b1f6feb592d8cdc0112072d4044d916c33ed3a7331c4419f1dc02abde3ada501bc56e1f46f4a26fce9efb1fc024ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d21f4d8e7e45c4907ca88f55d5aa8464
SHA12dd3a2c0fd3364de789facd6e9ff349876c586d6
SHA25693e8e63052f70ed05efbc579ceef200062df3c784a8921ce8f58bfaea5f287a3
SHA512f9fb255f1aae1d81c0fbd65103e032ec92e5274c01e0836c31fedfc176c0b54c456ce9c319256b050ec45ea3ae88b329e2118eea92ebadab92dfc324e2b340f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d62acdb346416b34c2e67c9d8a7b10
SHA113d67c6006ff0deba5872262c9edae53bbcb522b
SHA256f09804093198ec31db314693aae4e8b9711b903e8a50b361ef74cfac0ce4852d
SHA5122f580ccacd1bf87c18f13ed693389ab84d80cad1ac9f95eecf6df462ee8c4c76b3dab13897021b15cf9c296e2a451fa764656ae36cb32f3aae857212802b8dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ab66569779001e44b04ad70c87b97d
SHA12b6f62aa0115018a087f8ebd8d48cff499a61e88
SHA25652c19dcb7c54107eaab3aa7e388257ad8dc04799857cfd25fde2d30127db6f90
SHA5124f22b45ad12e992ced52e3825e605e924f88c5223617ae07cc144590bfd96eaa5a78850aa4dce370e819699ea50b1830ad75a0fa85f130ba466b03180c4471f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e6a647dc06950bb928f33eae83db2c2
SHA1d1dc75796909d6f50cc9a021674366f29e5ba033
SHA256a57fa53a9df125509e6d47e6ab4df6812a21d286ca3e3cfe52864d2c17ac8548
SHA5121c0c5c0895683c76cd14eeaece48eac0e8577ee95fa75fa16f07589b3663609cb6d04833a4b66a65aac885a82c42945d67f7a54e9d7ef6df82ebb6a738ae2992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd320b9d8466bcc03e4cdac19e25a625
SHA1ad35c055a3670810a9bfe445ff21e810b053ba34
SHA2566f6771be795751bb2a56725b66d27879ab6e1649e19be16daf87bdf9b6f2bf38
SHA51263685d1712752517b5507d02cd03c195f1bb3b357a83f1b54bbc0faddedfed47ae1b646a7522769ff13368db8ba91fcf4705d51a355031c007c0907959bf1d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5283b5fe0b47e173188d977377bf18bcd
SHA1e1d4ff19a0e9ecc36e2495a87d0f2b45cc230056
SHA256d72443c9ec7f67b9c5578f2073360b926f7da97a3f08faa12bf4aa28413a3795
SHA512bb50c746d82ac07027580919a3624efcef4e18a327ca7de06cfff99a18ae71e23891b6dc2923001649b09097cc9c0b46e30dad5b9cd35b11fc584a675a1a8031
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DODQ7AEY\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b