Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
244edc43d5bde08f47d147fe45b05836_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
244edc43d5bde08f47d147fe45b05836_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
244edc43d5bde08f47d147fe45b05836_JaffaCakes118.html
-
Size
181KB
-
MD5
244edc43d5bde08f47d147fe45b05836
-
SHA1
0dce55b1889de252044827fbc09b8aaa775993f4
-
SHA256
56eff2c8a41081269754af3ac97e0c4e59ff0894d246fecab8f4ab3fb93a0b51
-
SHA512
717609b1805bccd2834463ba391ef8cdeae84ae3ce41ee370acfe9e5d5011b05c52892b2c7c69926858822235b8b991edaf978344ee81fcec26f35f70c61ea79
-
SSDEEP
3072:SX1yfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFiM:SXgsMYod+X3oI+Yn86/U9jFiM
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb810000000002000000000010660000000100002000000008cf04e47c43e43c8d163be4c169be9b540eec4855ce61930d80ae58187a9af4000000000e8000000002000020000000cb8222f637e0ab0360f6c2d021aaab5504c729c9325d2298e462459c51fa9c62200000000ffc65fdb158e2a0a008e32328655a61fe80cd72deddd1a67fc54589d2bc60f64000000063c9ee1fb7c4e0a75064daf4296c347879f386c19b4a032ec3c9e13a8bc5d81504526fb9f939e9dcfe931e570a160b7197c3eef5b2be015d56164c5c101c448c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2834A681-39AC-11EF-AFF4-E681C831DA43} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08b1416b9cdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426221572" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2724 2440 iexplore.exe 28 PID 2440 wrote to memory of 2724 2440 iexplore.exe 28 PID 2440 wrote to memory of 2724 2440 iexplore.exe 28 PID 2440 wrote to memory of 2724 2440 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\244edc43d5bde08f47d147fe45b05836_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c9f6db993f4b2a7381669976d90321
SHA1decb38c0522bb6bfdce2d840aa3029591a26bb22
SHA256a2462d46ffc503f5e72ac904f4dadc6405b29e30647237e2b7d3c7f26358d74e
SHA5127a81c49a63232e7587928de484ec39f2b0b59a1d1b3a2fd3cfb7434791c40c9f76c3a110b990311a4b935284d1169a0af5de095a5c4640111ea6672e7302eb1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a56cbfd66ef8f8fd7b3eff7a4839681c
SHA1fffcc685fd9b5162df8d9f9b71c1affd7a93d39e
SHA25606d3797262a112c555ac22c93cc7dde9633e879ae5aa7a37b9ba9e40441e7ab2
SHA5129009c0544ed56d95329bf598fcd6c3898bdc9e57953bb81d637d9552deb4b96689365cb6cbdee06df3513ed1cf33ccc2cfc9d481b5e4a4f2f21e5de78ee8be51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518802bb2d03e7ca6543650992023af90
SHA144f293aa57e9160b1453328e045f1f7e24011b0a
SHA256745450e8976e74ead3ff4054f3f6afc681dbaabf159bf2f8c1f7464b61e99b7a
SHA512b8e6bdc1c1b83aca75f490ce6aee1aedd4eb97b3a0d820c46cdd872d5ca94f24e179826cae7012ef99046214b15b76fe32d06e26311c538f21bacf3fe9305ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcc218f359207662a01c4d3d997e52ef
SHA14ba15c845cf5ce939d7eb7c275d44263f1dd3ef9
SHA256eee4c10cd8a8b7fdc2a923c2bed51ab7c6bf81470aed347e20e666357bd28ea8
SHA512053b9c49397ff37486263dd6988462e73b39c00482d57c72bd76e2106e568ffb337d6cbebae44c40b7575c5e3933a9f81a84aeb34ba77d76cefa19cbff6c2c98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589066408f87e72a876e7c8feceb9581d
SHA1f65f88d202e5a9dcf33c7a40f01f264a205c6796
SHA2564e56bbffab2a0b6da6221aa9129d64aec1c1e229efc548aba3b1d9b1e7148c96
SHA5128633c4e903a0bbb4a356be25e14cfa86f3df3005b2987bda3821da2062a536b4b705068bfc0e0091a7c089969f2f148f1cfb8f1be677edbcf022eb94e1333924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54405f179ad2bb0a4b129c27aab987825
SHA13e163a8c659f19f60803d3e14631e9215a169909
SHA2569aec396738c027bc5ebf8b724e904deed152cb8f4ccb8945d559ee5994b204a8
SHA512037b070bde4472502a253497066c809519a62532e5489a3fc299707f4ed0e88e82ea8936b35d8129d7a00b5fddf9a7689ca5ca34efe3d0a282dce5c369a803cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557fa663018e3c8cdcf0baadd21de2368
SHA1f938cbbd44d4f884e97470584defebe606f59967
SHA2567fc87d830f79056eafd9907a67f480d620a9ecf5009a052fe9d74a526d4568ba
SHA512a8fb5b531e5f40eeeafc6a6dbd62e0a7aef4608c9abdfc2cdcdd491f7874e5b80205062d487c41870bc56c6b7ceb075a043a397e1d7159cb756e592653e78f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56070557442928a4b10bf89820261a9b7
SHA15fd527998fc7eee6417a6bbe8c0117ef8ab10eb8
SHA256119ed5540c150a600b1c02f466ead8fd15736086b6022e0f97979bb47940c3f6
SHA51283919b298530e3602098fc1d368fd687f6eeee0c46186acee0f9532ab47ea90c6aba8a33b0cc0c5c1128fe2593e90c2d678d1f566cbec50389b3ff81daa4bded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5256023d1c71b3946a612ac0ade236a44
SHA1ad31d273da0aad32c8aa8242b3ccefcf1203ab3f
SHA256758db9888c2f13db75c41850c38ccbe5426a95f8dbdcd897c4f02ccec85bccde
SHA512bf2ed705ccccffb7ddb0a2f477d2f3dfbd161de9c9bfa50aa94be4b26db9946289923ea5f03f129a593452eb35b070448d884868b20728387fa6d968598cee5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ab2b88c109004277bb55081c4099ae
SHA1e12cf6a4f4bc84046b7cf8802318be9aac9230ef
SHA2563242141323c85bc7a15b77f33b515bf2670f65ae28490460c29589c037cbcd43
SHA512d2683bf6b8d2668bdcec07f437e7f605513dfaf1a330e134e2b6bc2ed71eecd9318328903a4b5df7de71d7562a79db9c268289dead91339f774b0615bc30037c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511a8ae21f224a85efd5455beb59251a8
SHA1b851635b65cf49260c697d51e079fd8e66535ef1
SHA256a0698894fd7c386a005a0a45c2103283a5d137b53167b8bfbaa72a5e7bd08679
SHA512d0209fe123876b2ad361f93a9eb4639aff247839ae2c5a18264c4bd063ec1a126cd8d425d78ae7e807912102dbef2147dd7e90b52d87c1ca1ab3dc5a42040bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d1257e338796b77cb5adfb0ce3376d9
SHA17713b0c073f5f56ce2b1ab26b216fa4c93ef10fb
SHA25671431cd67414f7834d5e4feb4550c0792047ff3b36210be808c4806840b69ca3
SHA512cdb6c69e09610fe02422f01221fa69d68a4d8c4dd26d73593df0deaeb39c4cc2bb2cd55a7ec795c4cd64e663c29c904748b9473ae2260697e4c36c792cbb448c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515b51d97f8ac25f9e0d9e065c69a9e35
SHA1bf1bfebd3ca696be802a125ec047e7e167d9e2a9
SHA256bc9e9181ffdd802563f790532d7ebf3809649746fc203e1c2fd8c7a89c2d0ead
SHA5121f961f4fe38b89d29b1eac795dd0896f68423fb36aedc7b93efc6a6ed8463fd07234d901c3a893e7cb59a69701fbca1b28014fdfcdaaeb8e9bfb2a27ac38bd86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ca42fb432e67aed4aaeebc8adf23e76
SHA1f1fd0d0772596113dcd266d893fbc1024d2e0db3
SHA256e4408d57f2e066b61530183ca2fc15e668282ec2ff39e6d35c7b7f31c04dc03f
SHA51206694b42c88a26c88544e61df9d466a576e01825b0a48e1e6cbeb87e910cbf88da9ca3e4fd61858bb727348ef5e847abba254a7547226b36fc32374a6be67642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc96cec3b9aa1d4f55ca684cb584faa6
SHA12e702fc45ef3bdc2a386b037d36964fb943c7622
SHA2561fd816781f1cdb85396f698e1e9e241dc31279424e6a0e619f8737e6f939a8bc
SHA51281811e89898e3af36a7ff6b5753793830606cfcae7406f4d03eddf924f11c6fd2385062cef26836245e7dded438bdfc81257e42b559fdf008e9adcf9e577c318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5878118d8b596ff2e6cf0314108f042ae
SHA1555db1f40f83b1632657e3f1be17e2e67e1f0ce1
SHA25606efb2e98f8956fdb81b3613414c291d6d08c58161e99d687dbbeb4e529c6647
SHA51267b2d696f1755c0ceb112ab42e5aa851e64ea8013c96123d160a148102ef7a6f94be071335d5b231123b71d3745333b63b6bbdc17bdced31e0dfe842003c6ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b407ee179230ddf6234b3692825120
SHA14460241ca451fedff163beb8db51370135d3af38
SHA256f6a91335d5e4cdb2bfed3140272df76f73fdf802a57a4c16692b2a8fc35a9f24
SHA512c3056a6d63d67624e7c12bdde50b39d17ae127dbf47544a23d783e0124b3b75c0d63433aabf68d73ac9b4fca42dffb38f77bdb0ee2beee74c59f42334a1e88eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53635ad5c38cb0cf94bdb7727d392ed19
SHA198789b9e67bf58e64aad52007fb85fe41b1fcea3
SHA25672b9925ce9918b35da5a978d5911a838621a74ed0e6192a81664bd11d6fdb297
SHA512abc22bac3a97d9f9afddb08040dc6e295c57786f125972a041f49ca73aa4fdf1026e968bc083518634330608a9d58f5aeb26008cdb07ae8676f8d18e160b42c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef3b7d3eb92e65137efbbd400fc07d49
SHA1581e7e5641042d2a1667fe2be629a8ff57b669a0
SHA256b8ce087e60cee2a4eea6fa90ece45ff50d851855edb4c56c2d06ebc60432a6cf
SHA512727fb478bd0bfbddfe0ecce478789a57b4c2c9e2f59046107bb17f7d46abc537924789a881ae4d061c78cc3000726716ca18b063826445b2762ea9a6a6eb6157
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b