Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 11:35
Static task
static1
Behavioral task
behavioral1
Sample
19f76b66c14540d87cf9ad9cf42dd790_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
19f76b66c14540d87cf9ad9cf42dd790_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
19f76b66c14540d87cf9ad9cf42dd790_JaffaCakes118.html
-
Size
6KB
-
MD5
19f76b66c14540d87cf9ad9cf42dd790
-
SHA1
2762279c6f742e39f04eea1ed81325a2856001ae
-
SHA256
5ce88b2e8b66eb6d3930101a77780072e3c03bb63ff84ed466e470ab4be389d9
-
SHA512
5db0678dc666df47ad343c632390c75aa31f12991320f773e62736091e99f55e5e392d5d187de3173b3d03bbdd4672b269ea64d4dd70fedee60d8927b3ee3ec3
-
SSDEEP
96:uzVs+ux7J6ULLY1k9o84d12ef7CSTU/bx0X4wcEZ7ru7f:csz7J6UAYS/towb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{957170C1-3542-11EF-B587-FED6C5E8D4AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000007dfe95d159187fe627f3cf407b21a51234e5c9e58a6f3e7e97d0294177d29f7b000000000e8000000002000020000000a747c84402579ce3b7aaf1b011b512fe0014f64fff05a7564b4b84691ca70ff2200000009f17742a452c0c4840571149a7b162b24e473dc4ab2b81b8b1cc7267873ed610400000003c2b87988b09288980f7ac8efaa472083fabcfd6ad1134145a6436dd9bbf72870a21028a90c284a8150d6bc15477cead88bac3c2d009571e24bdd6dbf9300012 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425736423" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70155c6a4fc9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1548 iexplore.exe 1548 iexplore.exe 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE 1872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1548 wrote to memory of 1872 1548 iexplore.exe 28 PID 1548 wrote to memory of 1872 1548 iexplore.exe 28 PID 1548 wrote to memory of 1872 1548 iexplore.exe 28 PID 1548 wrote to memory of 1872 1548 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\19f76b66c14540d87cf9ad9cf42dd790_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1548 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5874327887658d7c71039b7df8d480b25
SHA1a610b95bc10d6c879585b9365782e64a1025d833
SHA2563e20ea9b53a8186fd990e5cdac73a386c7393c0f586c35eaed672b9ddc92209e
SHA512d326991f8bb227675b26aa77dd41755a7a86e235e1db838186f812095ed7ecfb10df00fff16dfb82dc807286c940d8fbda7f032ed9406a429bd3d204663cb387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d369b24c686809f1a397e9c6fcea1606
SHA1656768f481d11d81b87648f0ae22334de7bda0ab
SHA25669227e191a5ae19a2f31d6dd9c777123035fa20402a1a8f39b944aafb21bb9db
SHA51269742bb626ad96bb94e45b7cbb9da3fc576c2dedc8c38b4e376bbca27d2a4af991fe74d1eaef9e74f758fa33589dd072ca1751c3658f4f2af1772ede56e09a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58580a9fbca7f5c69894c2335aa5a8bde
SHA1f5c914cbb2474677eeb697ceecafbdf9609addc6
SHA256a431215f176982170977fc22c217bf1c01b042abcacecf5e6d140f990d29f885
SHA512ebdf612a089d888068643f9fc674bb3d8a33a5b9bd40e0e1a8397805dc3108d2dcd1128bce18205e7ab40bd767f2a4abdf4400fbd805cf2a560b5f21fc8e8da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d44f834ab50375e4451513fdbbcb52f0
SHA15617e3ed19ff162dbfddd2c5ff636fec785dd64a
SHA25635150349361ad005afff564c0f82c3d4cbc9d3e36af7fba9090fdf349a17f39c
SHA5124640478a91d10a6a77c0b6f160b9953405f4a70c0d3a4a2780e53b4f965e8efa0274fdbebc0d467675052c28704138ff25ea90d85cf4e18cdc7116f163ccc2fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f7012d64a30a62efbf1450d42d2c84f
SHA1f0bbc89ed11a6686641a95e987716526d3ea132d
SHA2566f10cab9231e387869170d1d9cac82f2b4f2d598fe16f49fd74938e43ef2f3bc
SHA512a34cf4ef1af8ba77434956eb829060dadf6582c69783c9b5c3f4f4708488ef327fae79fbdb70c50e20f512a76aadf9c673d67bc83fac9c2acbe17facc8e1813a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5638390efd3d50012ef51f59fca83ad30
SHA18f2aa1959ca5df02331acf93804144851ce3b544
SHA256625a24c5e610fab0000fafa2b73de327649846e6aa00c4ab3a555d961ae684ab
SHA512b478c6fe87f405c92e9327b9201de35cacf4d3c00e404bd3036c5c9f6a912d1ec1d7b51ea695113779ac3091cebbdc33d1282cd5b894cf1d1cedd990ba7499be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccb6a1fcd3a63e78808bbc9027f79b33
SHA14022908cbb8d5a3964fa0db97d0a4ae6df0647bd
SHA2561f1bff692230a7542373275690aa1cfde4f889d2b86ebec665b7aa584b5117af
SHA512f0f5b41ce1257803ca1b4e6056a8ce1d3af179d54b8d23609e9052099d56689cc435184553b4da514656ec6e4b167c5240d03f96fe9935871af8c6d82310a51a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5678786f7d8a8e287d0263522e0480972
SHA153fc58c5f4ec5af9ca0c1f06e500418d294a8227
SHA2567b1eaee721b588acf1ce9de56c907b178910af31473ebe75b08d1c5853ea1f6b
SHA512315179a03aa8b67f8112c9be44326cd4593408232799382b2b4deb730c4c72c214d64d141617ce1d3fc0283c6bc1b371d91fcf1bd4452e84f92b2b6bbc7faede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507a29e72813ff89c2ab85b3074e6e73f
SHA16771dae4a8d4ee6b8bf9b92ed34cdf6ededa6725
SHA256a482134759d264a03c34d8786902e77560d773ea3957e4d813dc947109fdb7c0
SHA51236dd9d3cae60b8e09a3f88922c3b5d87a14c0d07aa36e805b9bb26ad1d9b8ec4d4597a760f6f38e9d9e3e236454290d288296fe0788f51e97fe89633832ec17c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d658148a59090821619662d13b9be3
SHA1779642305d59c6838322a4cc118defb9755e2a91
SHA25600cd402aca902194efa962ee7b138ac53addb20c2d3c175334b557b64842afc8
SHA5123ab213bf4b5d9308b4e2cd991b28f17627c290197f1534be57f9a3da0f01eebfd3acd117ec6c41b4e0ec105dd497fb3207f882d29641e98067061bb084040756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5700b37f64f0c16d85bcc5834a51c80ba
SHA1f5f4e2e28c57b3c09cf615eaaa4449f5e687afe6
SHA25626ea8bbfb265b9cefce55324358c0db5ecdeda4ef56594bd1778402dc20e57b0
SHA512e143888b20e317dde779b2375a9a09f4f8cd3e8edfb7abce79fb09bedb86d6bb6b6c0a68156b9dc9805701edb424ea1b385dacc96a6e5a1b5b3b2a7d3c3dbb4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56603fde704c842f699061a165d3e8ff5
SHA104e0e4564620f9b05e309f2c4dd130143767c1f2
SHA256faf21efd79a5cfd28b512a4b160dc2a4096ff4f0d81085aa1cc4a83a849d03fb
SHA5124a610c780361db076577801d59ac050757ca87c48e5a87afc20ef4140ab60029134be3bf7795249f52b5c8cf136dcd3e189e15b7ed480c39114d765c11a5cda5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58349d5fc11fdcde70be100fe0655fe8b
SHA1afb40af5822a3c573624ef294d9751756bce8d90
SHA256408ab373ac3a1ca86ee7425ef12840c22220fd1f0a13df8f92b873ad1010e4b8
SHA5122029ccf207e79caabd1269e4e7afbfaf7134f5018f69d4edd3e7c61490cbf398331466c45e2be37f14f20e68d26ff1b99a05491d9ff3eb41132ed6318ac08401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524ad364ba1bd03b15caf95c321fe374e
SHA142eaf347c3e18d3635fc05b5d3168fb3d4f79056
SHA25678e0e7814aa72794cfd8ff4bee995f271a6dc834575f2cf9fdbe667159c3de2c
SHA51221bb37cfe4e77a8353cb50eb75eada3fcf3cfb75762d4f2687d4b053b4a3d3cd59fbe7100a6339f82d597a5316c93ea03cfd73a14c064fec5e72aa0200c56d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6a4b11dd301f753637ab49b4bfa5cd3
SHA10da7625482a7fa0aaf113416f59b2e3cdecc20cb
SHA2564b75278fb8df703f042d8a4b5505488d0df917ff6f378f58a2129dc39cc63be9
SHA512eedc77be495bf2ee2f4190fa2d3f0b8109655772676a51908edfbc41fc2d639b66b7d4d186d43a80b457f43412fb634d044bb82c45f64bffc6cf9eb477cad772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590c3f965980759f1544c656b81e28ff3
SHA1f3b24e11ab91b02aafedfee9b01521597b11bb6a
SHA256315a448d52d23025ec3afd78ab9edd02f55ce8551558123f9513460a4704bc15
SHA51289b770f44d84bc50d14889ccbaf241ca85303454f79184622e73f07d9bea07beb201e038f573d535ffa819ff4e8749185427e134b2b9defe8a5b11c4c58d0913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac7d6b6abdc543d00c162cdd0814ab13
SHA10f9023da0eb6cb7dad7a5fd4343082d0b1d50db2
SHA256f7cac4a4fa8a65180e8eb4b6a30f7a6d9fd97143918d70dc8809fa6e02229097
SHA512816847774e6aa1603e07e2b46cc64b06a1bbc19a15ae0e197914fc60c85e8bf8a6abd7ec1110a16c5b53794177d20c4324d1b4651050806c5a8a8a788d776268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598b6a6ac97438d6bb958e0b76a29b234
SHA1fd46f1e1943cb73ca066b7c6bb1dde645ef2819c
SHA2562852ab1c0655ef1d321dbc439de5e9db649ca52417b8ed4518890342491ef034
SHA512d0aa0758398626102c3ca9ea2b48711cf2c2f8507c4809b9a7ad451138bba3807085ac2a5e8d60c3425a1e982849f324fdd00e7f6c0f3aac3813952c35012a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c5a5b442f814057001575246f91560b
SHA18e0f4361411e85b214a01cd1cc4954a816cfedde
SHA256852c190829a62681a716e17ccd45f2486ae3927adfa937b865dd157e72519128
SHA5126a7163f49680ff49009654458cd62e3d47bfc4ac485ec41fa6d613d1e2aae4c3624e6d9a330cb27ed78fc2739924d36a4184c9ef3c7c714abfd5c443d86793c3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b