Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
3264a261841fee7a475d3e3345c4cb16_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3264a261841fee7a475d3e3345c4cb16_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3264a261841fee7a475d3e3345c4cb16_JaffaCakes118.html
-
Size
30KB
-
MD5
3264a261841fee7a475d3e3345c4cb16
-
SHA1
1d20e9888c964485201c9e482a73f73b0503c749
-
SHA256
cbe48b791010f5927c0b7e5209b09969f2afdb8404194aafee63d88e3b57c467
-
SHA512
524f36b09bf255d946e0e7d5df0c721545c920fb470b5cf5afcefe554bb2057df544033f6f5f5e70661e0eaae6d1594d0d1a8c96f13d7f4a26987f787e6c5852
-
SSDEEP
384:+6Ze/Eu1YHu5XaP7xLP6Z7MYLfIMO85mo9ZsyEdQcpPqiNjuQMO85mo9ZsyEdQcD:u/E9V6Z3fkSnq/Fu8Snq/Fu8Snq/Fus
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426729154" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 203c8acd56d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000e55b32cd3ac0f130aa654e84555f67f65972460602511c8b456850ecf3cbaed0000000000e8000000002000020000000d5e3bec14027a8506ce6530bc6faef23cac3943b90ceb69495efce37189ef58020000000c56bc7e090f82c6bdb9f20ca6ec5636084c86442ac9098b8c489986a29eab161400000001c882eea38f5e3471bded27aa45f5e6f123d303bdd52e378c3d054af80efffa2e84d56edf64b10c1977bc161bcd1fd24322a5b839d569d2b207ff5d59b982942 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F74D55B1-3E49-11EF-BF10-EE5017308107} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 3004 2148 iexplore.exe 30 PID 2148 wrote to memory of 3004 2148 iexplore.exe 30 PID 2148 wrote to memory of 3004 2148 iexplore.exe 30 PID 2148 wrote to memory of 3004 2148 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3264a261841fee7a475d3e3345c4cb16_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508ddfea7383e27fa7a3b07206edf7cd5
SHA170d427aaafc18465aaabf1c845a19b9809172e8e
SHA256869aa6f7dd693e1a2d4c3622a908573c14ab5210719fee2c0340e228893ecc73
SHA5126a9879b51f9541d375588b4092863a4339feb13749d12cabffbe2f9f7867339f01eed513686d927b38120695a1fed530228871665175d532dcb66ea12003dd4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b6b50eec25224023d91a59053a9b421
SHA13c6e5c81092f0bb78474847bfc701755cd2c1840
SHA2562836845c0811f59051d0b9faf6ceddca5521418ab62e77d1d51c2dba44b862a8
SHA512c84d63e191dc492afc06aba6ee51d9994b45ddc786f29a3d3dec3d928f390a80b8ed4d6223fc33b3a99633cdf1ba2f97afd62a19dab0813f867efc166f8d9058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c6bd7614fbf0815ac4d64addf9c70d6
SHA1cd72be0da3952d0ef5ad746fbd286ad34de8cdd9
SHA256806819fbaefef5edcd03776a5831df07c33157804f9b4d99f34639feb4e04422
SHA512c9842b80c0c87c4ca846104eeed1d2354cda3eff6cb0c9f8a4a2d1c65d8e388b0ec434e68a2905b1e297f38fa6d223d5137adc086d5c339e8ee450a1dd6387ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0ea7585f6e9d6eaa6babd8800af65ad
SHA1d9623a6fe293ee27cf9c40f4dc15924e9d8be2da
SHA256d07daf106432a2a94202443e35da8499bcfc579ef1597548f5e1189905beb290
SHA51249bee21fe6fdced43f47e4f50e0ea6c2e2a658cb6278021a1dc7e6fcfb3f6722a47f9a64f7b58a10df8240e8d7830d752e350e0beefa12c399f1f194a3f4443a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583c562496d9c6c0cc22943015df4e65f
SHA18c94a06b0edfa36eef113af29f43aa54b511469e
SHA25648a66d1a356baad0cc8622df9f8ef752df12751aec0ae8e5dc5955fd9333b3cd
SHA512d987731f5c7c902d3c8fd435020bea81bdccddc5908b048f99f5de89563c140d61721b926bf3dcf7529423ff773124754d477cb0b24e55591a3f6aa691ad585a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571dcc9a190a4e8ff4e0b213a804d58c6
SHA184548b79d1fb686f8679a767026cdfe1c4040f2c
SHA256c0284c18fd76f96f261a82253e07095dac279ab8d4173b219e13a35b7ba857ea
SHA512caa469bf6a59fcc646e70f23c963eedf5828db4671832ef054a0c94d09c4282b1b771d335c24255390d663121baec37471013ce02d0b0c8b38b02800159cc16f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5088ae222429a9160a7cf522c46838f51
SHA1395807c0f4259dc8361e6f1db69d63705aebc5f9
SHA2569cb199ac4386ce187188f7398c7314b0856c97c1ca9e2e0d9ee0e10702fc5860
SHA512dca899c84351434fe03ff25af498e71c6b159b6cd054119aa894b0abda31891168b4d27f748626ea3b49e14ff866ad0ba326b40f6d2f630ad8f8c95064edac4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525f7f62fc07d85d0c095680284d98e8d
SHA13b6ff76c8c249ef06919e6055b6216716e3bb1d4
SHA2566b3c8778c2e2c788f992fa29cade61f6f64bb69740517ea245c43f68b848fe9f
SHA5122308ce009a8161866f9cd4b4ed7ecddc874ef444c088aff947d12be9f672ebbc12a6028282d4cb7886fe110691537564516e6721da03ecfff84fc38f8ff85592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceaf759a6174a92352189eae80c2b13d
SHA1dcd5f96cf108ee45edd2575b57c9d962618389ee
SHA2565733366e70cc30b30ae8306a11b2f24d1f206c2b4f10d44729012b12d59ab245
SHA51240dbeebf3ae53a7137e2d4a939f0de2881013f03ad42791b3b2e8152b770cace23b1045b98ce9ffab2e538b6693c575d7c4585e7d69c091e35503d2af5518a3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f0aec1609c8cf7e5c8f1e138e8cf741
SHA1f745912a12fb7c31830a72787ae8e8c0ff41e4d6
SHA2565feb7e9e448daf2b15dda217fce11215ee7b3d87f299ea301d6cbf9aec687abd
SHA512bddff585c79df77df462324b4308a107b228257b54f976c950ef488fa7560b74f624d73aa8ae437f6d46c98c05d85cf10b3b48893a25eb0ee03507cd943648b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575193215ee998e2a9c72c4f00b264d0d
SHA1cfd061832491d2f59e3597690c15719fd87f3ed8
SHA256f6a1471fb1c2267970498c36815d9c953ec213fcc460efaeed09a55577a3bd77
SHA512c4fdbf9d221729940095ca62074f0d1b67b9e7ce44dc494ed81a019c24a608d6bc390104a973898d7ddeeb9a0913c0b550d675fcf2d5262eb044f5c0427b7414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c939abee6a360a651c960d5f94cc212a
SHA1fe00e14831474b1881010ac6b6c3fd4bac2806d1
SHA256d462932b03ebceeda9a15cfe1b1824d95d61950c72c16d80aa599955e84499a4
SHA512404be6bfec6d985432c40cd289475a573cd432570ca67a25c042cb4cdc8990a3e0f3a73c11f4cd03eac1379fbc6dd12e0c32a24fcc03b22bbf2a20792132486b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5290fe7c82a50d02059e34df071fdb645
SHA19d8aaf4c2f62e7ef9b4e0e5aec7810d40c46456d
SHA2569d0c783480cd72e562aa5e7e1367a76f5c7051ac7469db4259649f33cdb2b1c0
SHA5129707ee8c0660bac9a56335524741a9904a640fb7b1090351a4263526e2109671e481c00f19bab77867af8f2f75642379a325333b937a6eec72c1ee4c05822072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e51cbba71def8271184642ac6b87b356
SHA1ac26e71658bfc92bffc98525a32cc5c09fe25d44
SHA2566ff37d02d5c0f434b631c0b71a890a505a474be3bae1e0b135cdf35d15b964f0
SHA512ade9dda7cb9bf2b10f620a4e25e8cd42924b4d63cee17769561fcd1ef25173b3882a67315532de080aad7410e5e4ca8aa24d0451f0783fc5c78d3a458318dcbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5640409c546e6e409662817ddec41506b
SHA1fba76e781660051ad0962bab00447de9a0b6c7b9
SHA25689f0654357259dfc046a570749b654bd0e90fcb602e4bf09f55007a4bd7102e7
SHA5126c22d2864cc07d03cb53b352ff08123735f170d6f1e3df0b6ababbed15c40b281c3d91730069a71a8d59ef7cb997b06875d9f995d0e3de717cf645a277ddf37a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9c177d3d3256096e9f45c9b98fc38fc
SHA19feb2dc7b0d3fcc12b76258a39767ec7f750cd34
SHA2568ac38378d71528644779f649d876e8d20a68e68a88af40f9fba292884a5d6ffc
SHA512d1d006cd4523b5fad6b9fdde8ea9b2d0d1b7e130e0cc31f79a7a5dbf58bc3cc497ab62fe56b0bb273e6cf80a3320dba8df05bc8f9453edddc66b626803ba2151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523ea571db5d41cd9307e4ef9513877a2
SHA1f52b0dc052aa6e09b788d1b6861b496ea2ddc65b
SHA256550aa63100fa7ccebf3fc200fec70ed25c6769661f26383f3d75a27c25867e61
SHA512106611abb46489cc71178b8be79c0af2e3f1f2bd2ae78ec9062fc5571334ff5d23b467c1233a9e92d0fcad8c6db8179c1933d3dd9b9c14409cd782f17ec54499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0228c3d9e2f2c8968ccbdce7698d309
SHA1c49788bf3b8f7cc97ad4014d4a6411adb2d60271
SHA25610d6ac0265a429dc4f3764307fa659d32751f23d83ae6805cd5ffdb13712bef1
SHA512d85ca7d6681e4c7163f4e3e8c239cc6d27682da97f09955d55bccecd364fd88600944d03100de7f292245729e03dc829e5785807ac7836d483206250468a9d13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5368a253b0c67fd9b8e22c70537e981fe
SHA1f714946f83382a0f91b689e510f3119e13124d9b
SHA2562570a569257a57a149bdc3a1358aa1035e839ac14c19cdebc2805f3376468271
SHA512605d76659f538eb1d2c051c445095778b1e2a19c65e2777013d7768374a0bea37b5b637ff63a11d723e9044b9a34a3783f477e27cfc42f981d2733be0b820625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5889042597fe78939e181a0660050955e
SHA1c2c6c42ec546a3baa114159551da061af1f79555
SHA256c4c9cba81472ba4a978c9e080df4a005113eb7d75c14affc22c8c12b31701bf4
SHA512ff495534abcd10cec4783384fa794894c0ff6ed9cdcd0c72d3e58b12a7a32168155a5be60e63ba1dd8d9e59ae2e2dbbc052419a92a19f2b47a324dc0b7055cf4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b