Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
2f53c633f303c062282416abb37321a5_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2f53c633f303c062282416abb37321a5_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2f53c633f303c062282416abb37321a5_JaffaCakes118.html
-
Size
10KB
-
MD5
2f53c633f303c062282416abb37321a5
-
SHA1
0441e65cdc4f0bdaf2cf9248dea2c1a1c284c606
-
SHA256
c9e37f02d37f227553ae42bbb1e3ae9ec66b5fed1ee18151d833b48fc250ee67
-
SHA512
53c88e2398e594c823d6a102d37d0919231d71d8ed16616fd389743c9932b5dc15785af42f8bf636fcfd8e2d1d6ff3a8c6074f2ad03f22f42c4eabd9f86bd4cd
-
SSDEEP
96:uzVs+ux7B/LLY1k9o84d12ef7CSTU7GT/kny16uprxJ7g6teLP4vJNlVHcEZ7rur:csz7B/AYS/CyBr/7teLAvJNPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000085bacc9f36229c5ad3ae87dfbf2fc49863ce2f7ced2a7bac914d68bb50086cdb000000000e80000000020000200000004c13834c72945d59bda0f8da863fc44136c3ea4c05deb986ed8b0ecce7d14893200000001fdc5481cd9b2ee26c06c9a51ccb1ecac7cd65a5b0a31c42d5c71178c252091840000000ad9514f5c2ae30303a78994a3b93c5e3fd5708e2988aeef31392110b5e3793756a7b529a82ede7b64b26241a3e66a2cbf4e9ee9f5969015aef6efd59f1066464 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426683999" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4642BF1-3DE0-11EF-8912-C644C3EA32BD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8027ddacedd1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2572 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2572 iexplore.exe 2572 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2092 2572 iexplore.exe 30 PID 2572 wrote to memory of 2092 2572 iexplore.exe 30 PID 2572 wrote to memory of 2092 2572 iexplore.exe 30 PID 2572 wrote to memory of 2092 2572 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f53c633f303c062282416abb37321a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eeadae171467c8c86259abe352ff599
SHA18eeef03270eda645ae60281fa10e437b8aba04f3
SHA256f515fd7154006f79a40a284a4547c5e7c26c87edb9aa065ba50b65b0b9870b86
SHA5122e1eba6df2b4fb2ad3999c57216f370168537cd3f011f84fe2e0f2ebecaf33e47e8ce07d9a3035fa35a86bc26a2fa472b0801ea557d8caf2f498a0f4e398b4a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fda24cc8f990960ad50a230a391a9fb4
SHA12d1382322998f4966db8b6517eede815177eb36a
SHA256fcaed488175589a64d9c3b417e2193fa97241948196d60095af0e41478da1954
SHA512979f3fe017132919c400bf06e29eb243acf04a24f9de06a59cfaab4afff904606df6ba6e43326b58d782a857c5f7c921058c3625b0d4c798b1306b46a0efdfda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d87e179b0bf68f42059684f01cc2e8e5
SHA1df752e53cd52dd59939c150221d3855046131167
SHA256826747f4baaa9648381f8b12589907d8f9f51bbbbb11b874e6a6fb557765c588
SHA512386519a98a5fc1c8f3aa7c309fb70f64dd62f94f4bd9d723603ade924a7a1e21b657b699c9c5fa0597beb8c23d9e7bb2f3a8ef1a7e1b4ef74c377dcd2a75a336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3e0ec59e262bea87d7677f8e9aeb859
SHA152db99b317cbc0e5b86759c40af30e2921912050
SHA25607dfae5f6b354c3a957e3e5bb2f9890f4f57a6bee7943393d436892e5e9290c8
SHA5126095ec18eb7b9c9edc303fa868a88ab8af48e15ab5fe3e924ebc2c03c5d6c364e4646822eaed1bb37bc370180243bab5a8de21512deb9a4f1203783cecfb00cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e3ac851913dc3ded36f87f3deac9aec
SHA1f5989cfc673a788e319f80125b4ff6882f42583d
SHA256c59737922be1c3988d30542b65b739adf02bdec30fa7383cdb35b77989c48751
SHA51264d8d17d74091a71a9c72df04c6a28373723c615c8abd1cea781c4baefa3d8de91ec2fa36df80e49bd94cbca19b22ef16a1c2d9cc0e54086abf282ce6c0c5e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f89a8cd239b9630791648038817b177
SHA10889f45ef354ccb022cae574723f2606d4b3765b
SHA256b4510ae2d683ebb69cc738af1719bf9089880b9bcf44437c1ad9fade1c174132
SHA51240e8df30bf2b646ec721e36e3372fdc345045bee07dce8e9d5fd3abd3e1b8a6b4d33d88fbe67ad1df94a21825c2ee95ed58fe4c8ef694fd23854c0968faf700f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b4b0a9c4f056cd5c5fa6934b4f19b6
SHA1a6dfa23fc745959d1916902206784003fdfdd048
SHA2564cdf4ba659a6f8fcfc4f720ea3c48fd34b4a8dfc8f9012aba626c1676849143a
SHA5129e5b8e1344cf708516a5fc74a10c3db3c64efd138319c77383d574b3d247dce6006dac723472b60842dcab0ecec7c6e2f1ed9cbeb35b5c4134aa8387b54613e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590b61a5f9998ad24736e64d67613e506
SHA1a4b87face81fe06bdb5c54e66f3e4ede5c233cba
SHA2563feb33587cc1aa084aba65b914f06b564aeaf87ae26cfe3a1b8bb846ce5b5b75
SHA5127bef71ee0ac07f787bd97883cc09414f4a71f5eb4c6888aaadcd3c5162d5fb1f0007fbc0c629b50dfc28c4c794308b6d310d0b24cf591d6f454184dbdfc77927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5450fa0c5031a7af830ce1fc689611a
SHA19153ed8b2b9b4e8b2e53f3f15485d41274225c04
SHA2566e7a6fa6202bf5e90e9cb394397e4f1be0c215b03f0498f20f7d8b6447eaa13b
SHA512ecc9a198a66fed44ff307695775f1d489c994acd0b13685404bb1982e98ada9c37ba950e72ecdaec4339f1c95d3bdb529473a173056374e0b5c27a613ffdd6bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59781807384ba27e58744cb3eeb4c4754
SHA1dbef853f9888ffe56803dda037ff66de94580eea
SHA256466143f664db3bac7a508a1466d24aae880572f9b5a31708b184e9c5a5a1f899
SHA51202591e323478c0d9de84cc781dd6879ecf9b5b6270548bd6757d124b242f47cef9ecbd9c8e75729a1d4887e7306ebaeed6826378ce070503b8562954bc2af27a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cf092914aba5e9b4d4416a7a35d19ba
SHA1e74bf05b0ca89ac54192eae1940d79df7defc10a
SHA25611ecde9e5b45094d7e366a525bb9d88ea82755978480f123e428f68dc92dc263
SHA512a08eb5367bb03ae141cf21e748fae6b29d07dbb356680b44849471a7bffef16146a360096dbed0ed73241ceb8fe03f8080eb618d20e87c50172f14dca07c3903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d37cbd796a7df4113a70a68f2987c000
SHA1d8b0cfc3ce53d6cc755eb639ed615ea0cb22cd04
SHA2568d6aa81c989b3fafbda320e98c7e454db59adb79157891678a23c618cf0b0ba2
SHA51240a53eba09162b0b7c012874e8922d551538171e15896e9a49e19bb4630ff539c17ec666cec6236ebf79d5413de506d741e4b66b7cf9b7ddab35f17322973158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5603a4e23dc0c37d9d55ab86ecb903607
SHA105cb660e0648d906962edd8dfa7ca1574fc3dc79
SHA256e560bfadc3a685eaa61ee769c4bd849c0fed35659573f0d238ee35ec1a952266
SHA51262f5c9106f2ae800b98de211e4cb0779a46bf33468bfac416e2f6195a92a151f746e749d2430573e5f93c88fee1c7a8c672f9dadd05107649c540610fb00614b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c6c01f210a093f53541fe2d369810d
SHA1435e73e0b1b4754ccb093446c8880047d2448eee
SHA256d8a7f3b75a1bfd38623ac39702430e008d2ef14f8dd0a782c828174117ac5e78
SHA512ac2d6a535b2bb0c9fb03d76417b72d25255e83ccf8aef5c9406b10976090586ae6dcbe3dad3c353dcffd0a2aad4a555e4e588bc7ddee8e15e92486ace3c25436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c489620e8bec0327ab5ced05173cdad
SHA1ee6624de8ad4c16a04213b45fe5ba77721e166d8
SHA2569fe839f2bb24dd70ec0d3636848942c19bd7457e91fab55fad1023698b5df450
SHA51222a66df3c5e24ab4f9a55f1cfe786b14148700cc343333fd8d9c791bba3c089e03da7058ffd3f1f648a944703cfa75ecf7aa8f80e7b938085bbd8fb0d3db052f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5694587c7ee222ba3eb9bef08ba99f2ca
SHA1f0c59107fb25da058f0d5c070c6f4a10d8a6a231
SHA256f57187cf67dc9a1932d4e2443e3d5257bfca9fd1ac133f31b985a2169e301cda
SHA5123f20ff1a5a3f7f30f51459b103c6301c936f44767716a330194bcb1c71cf0ef97e72aebfdb891a563e6d36d4994b31deaacc5b4bb7b63c4a064e02fe031ed473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550c91ba3abd3687c22439118a70fe89c
SHA1c6d10ecc6eb9cdcbbb98055f542d477130ac0a2a
SHA256370fb3529d20f368f05b6ae84b27735298311153961565f4be0c0c5ce3b258e7
SHA512ba289563f774194c3a43bb425d87e9efd392375358308c04b76d3effefcbc8575630ef1555eeb9d622c03440542fd113217da337cec70457ed27218e2e7c3dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53710db0d3d52b4a1450f2f980bfa6b91
SHA13f199bc1bd7ce33c114fd0e39a84bce6790a56dd
SHA25605448abc58046c966c18d5bab0a99410b22a75506e2ec0d3e9acc3c0988d51c3
SHA5120e45f8a742ffd09b1db57486d4187c165964db34c62e747c95dfea1ed861bfb38f49c3cdac414642a280258fd0d8e0a626239cc9cc25651472be077bf8cadb20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b674995b5091e472b0644b09eeddec5
SHA1f453c0c9145ea6579d133d6e7cfd0f9878b76b72
SHA256d73d0040ea4f769b8510736f40cbc17e8c584d7d82981e63afd9d360d0da35f8
SHA5121300840dd0ccf1b4d5aff8c1aedfb8106d03ff63f43fb45983ae3360e783720cf053ea30564fab2a2dfa5af89dd68be3cb92350e4f862ab1cf8ed9cfc0fe7288
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b