Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
315250d578e433e04bbe94eb58f4713d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
315250d578e433e04bbe94eb58f4713d_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
315250d578e433e04bbe94eb58f4713d_JaffaCakes118.html
-
Size
10KB
-
MD5
315250d578e433e04bbe94eb58f4713d
-
SHA1
3834b65a90e5749db146c90c15e2027be44512be
-
SHA256
cdcb6557524ff9f57fd0f580108548d3f8befcdacdb8e50d39bec177659b6f4c
-
SHA512
1a905834fbc2bb720d0023f86f05aa316ac68ef7edd247f07b2584434a3cefed41f477d04778fcb9bf0ee6ee2dcdee0b3c659e2bf43e031889a2096499fc3c56
-
SSDEEP
192:e9rmu2XAbUKc7Fgku02T7Zkx12sL+E7ALvp6pzpgOp2SpNxpzp+apTpzpTprpjpG:zXKc7Oku0iUm7gBxxpRhxphxR5xhR5hk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000cbf77da8331608d6f8b7a1be5358e7a3d85133fd165aeca77ab88ff74ba37940000000000e80000000020000200000007186a00284b72ad1b5d5dfb3c62c26e64f52243b9c10b531d171ec6cbc77777320000000828df77bafea039d938ed51da6390bcefda668973d5cf5947ad92184a7695f4840000000f4cf02bdac2ea5d13d6c40d5291c18eef1e54a9da44ac7abdec20ea0b7a250d2d93d8781e65bfe6fa138f2433fd232bd2ca9c668602d026f37c80b7e9167f4f9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1916501-3E23-11EF-9E0F-4E18907FF899} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c5e28730d2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426712717" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2288 2244 iexplore.exe 31 PID 2244 wrote to memory of 2288 2244 iexplore.exe 31 PID 2244 wrote to memory of 2288 2244 iexplore.exe 31 PID 2244 wrote to memory of 2288 2244 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\315250d578e433e04bbe94eb58f4713d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560d1eacee0c9005ada78a02c485d30d2
SHA1b42abbeffbad5238995d61cf7a86224f2307047d
SHA256026a2c2e9e86d2acd4ea84a2d8b9be024ca66b678db961a64e88a01c7e923b9f
SHA51263f5911d30223bbe6fb0e00a5346caba6005b5d717b79ccc51f87d363cd92d9f5aa0e0d8da5d67c6cd0e67d94fa2c4d1b94cf5a01b61c77eff55a45c0ab4f7e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56358b7c6349cb6b712a32dd38d7762d5
SHA1da43b7165a615c352373b8a9f6d0474fcbdcdb7e
SHA25665ec45dbb368797096bfad324885c4677f9cafe3420d7ba20a812e26403e315b
SHA512a295ff49fb2ed85d13855f476ec734026b3ba9906582bf6868c79f80911f40aa813a5b2d56958f8b6ffa1db6c5037b6dde80f03267ae6db75bbc6fed94f44e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a4542fc33f7bc2127f34241558f7a57
SHA1c353af5d7d8f9ae889cf7c1a72e21383ea3c7a7d
SHA256d50523f4eeeec3fdbead461af21c3fdc78f147fb64120a433838ff278dc2d03b
SHA512e495ca2ee20c2b8061d46f5fbbf5e64c4796a38f812a23f64967cb20ded54dd8a8ebb643d65815007843266ccf06b72a12d369d1ab37da6c69416d963d25da85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5107dfe2b7512e82a09cb3ad4d8335b20
SHA1bcf83208ecd6c6871594ce99b3b0b5d532e04649
SHA256add41767c7fe66a605b8e901f50bfd30b350a545dd377bf571448352c74ba9f4
SHA512395f18ca7f042644ec2e7881ebf220d95a8ce003387b05a80070108657a0ee77fa1c47fd98ea33dc6fb288a08aa7d63a656479e29971c1daba9db8da2e42d8d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56825bc7b3a9acec16d8a09798f40b278
SHA13fe2a0438f8baaf36b3c634e5701e6783f78717d
SHA256034ec254e6b817c368e6442f43ec549e52f5f403367bfe845b5875c6b03df079
SHA512cffc5758266516a18e73929ec9f362a64ff6841ecee52d45a6bcbed97cc443ae8d4646f494aef2ed918ce6c41e34c848387fb889d0311b25674c4091c4534a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca3ca4a4fa007a7978bf3f346a65a147
SHA1a25cef2137e2a6b0d7f7bec3fd4f7055fc245562
SHA256224ead7e20014cd4cef625ab36c445ecaa8f77f56dffb33fd1c3fcc51c8f34a8
SHA51210198477cfdd0b0661020e71caac65e817b1de50eda9a313f674ec6712e1236b50a91dfb45c21e224d2d0a0c6559bb2cd4bb6488d4f23b4e35ca8ef86e6225e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8c7298eac2a473a737900c7fbf88644
SHA181880fb19b8555d3fb3f1ea79e44c0ef017c7282
SHA256fb4831d5434a8a3d0a766f2c9fdd7aa3689d712b782d934aaf862ec23800c2a2
SHA512e18c80ecce90c7a5bf48c8b9522c524e693a83ada001b97853dc7589b95d97217070a9b97fad1807a9819671035765306cd171ab3b9b4a4d87d8eaede6b6fbc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529eab520545cd7b4b557aec0531667d8
SHA178bd378dbf36937237c01a2e7240d2c2adab181a
SHA2565a39502f20c37e3a036d1e4263675bf56734a8c42cd490284993c9a670e1926d
SHA512e65fe81ed00a15674490dd7ad5c27b03a611eebd88c8df806e1e915ff447e17617643faca3a75ecdaf33dc23960b5bd47382a225e28135f77b260599edae8336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c697a2ccf3fb89113827ad1325c94b
SHA14089b935d02dcd581a787ca3e408ca1e7f12778e
SHA2564f493f67aab07574d57822ff813015797470c721925b40fe10fe529d9dc66253
SHA512232df87fe64f3fcafde1289c3ccf341311ee1e6313df3e6eb69cbe9c90087cd293719c3c4e3cba2fc3d06f49ca20174f22570976244b6b49170f49a5245e8970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511cc1679b7694ec5018274d3719b86f9
SHA1bad48c41c3504d002893d15f099479a081654bea
SHA2563e37fb9715cbac64a653712cca09e50d26d23ef6d330f5de3df75dc1e5e1abf5
SHA512bab46c7899074f06bc927c37620cf901c50952aaa9d9d337cb3c86b883e41ecd29a1c91d1c6ee31c86914e1df9635c20e463c354f41e474f3137adc2727cfa22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed1cf7d61027a8eb65a6bc8ee2fca095
SHA11f33d1cc3443438ab46506c8fca7ad2dbb9de62a
SHA256800a050e7059dec9e102fd081e7d091f4962bc01a760151b678efaa781419fcd
SHA5122de667234da98faf439aeb380728dca9595d481565bab9308242df5fa93f8ca13e131d3fab79573655f78395ab2b6bc22163b07294f42ef6aa6268ee03753f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9be0698b64d84d7b4d17cbc93bd7624
SHA13d5b19f6d771595f8125a42c99ad8e09e88a55a6
SHA2567c98530b59678856e207107e8f28e1ad3c22054ee863b9311c5833b89c454bf3
SHA51273d4f6b99a51f7f23efcf160d38aff8e07abcc465ef249fb28a0a7e87286339189efdc36517f66b491bccfc05c440b9c9a79cd611ea562072189d429bb4e1c47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583bbaec484b2bf76a2ed0c7140b5c061
SHA139b4f4713dd7fe7972bbdcf1af02ec5f2668558c
SHA256395ad2a7dc11d7c4d53791e1f65e7fdbffe7ed2959ad7058669da0e4bbf51333
SHA5129f9840f6689eeef3a8e36a85e2043f2d6b2bde401b5467620ccd680109c720bfc3e227be6a181a57a8d2f611b2fa7bcea9f00ff4533b66f1ac986b26e2d35b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535cebeb222e2fa3f64581146be5fe585
SHA174e9fd23838e17bd463c4ea54279407d43a4bc25
SHA256dd10d03f0840f2494636b98c297878d40b50b0cdf7fe4e691d3071c19d7e8e89
SHA5124534339855a6a361b78a11bdb135aaf4977bde6bfd5c1b7f597ea98c360f13e32cc8db151ff6b85894f49f2a48e6cb6b86ed485abb9f369481aa200733077c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579baa287743c50fe7a1716c6e83ad97a
SHA10692c1e37a6c9589c937d9525116e56c6c17645e
SHA256654e68251fa0ceee07eea1a8c92d37ee18fd292fdcd784dd0e59979636271129
SHA512c2e14b30d61bdf3b899c9b787585fefcddf8ddbc365261aae8ad06a82ec577a8d45318054db0b28afcae95ae017a7bd833b12cea485c9d6408fe9ae07c70cab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542239ef8ef97a454b50106135e61e7a2
SHA13e1df257726c96bcefbe832def42d7af21dbaf01
SHA25618be6cc7151fc26dd1673c6914f0cfda1687a507467db875982db106a2b9370c
SHA5128fc3d69f68172e7b1cab0b402a9859d1a9dc98f310fa5264b0d494cf79aa818709ea28e1b081e254beabcc3ae4ac9953d506fb68423e9327bb1e9dd94b5273b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2bc044b90d761b05d826e90db58c6b
SHA17b0934f5e90264b9657aaca3d0303079f615078c
SHA2565399bac9c4d36dfc5fc3ce421751627a2c40e98fd04c334c4f794f2de96bf8f5
SHA512ab2957ad521d83bf7961d944a539ea46d5e59e3d5d35c66e913e74d6b6c692683ceceb6647e305de364dfc69e649ba6966a00ee5d2840e3d8c0cb6d0bb330619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ed5868f5a258ddcf3f51b38bbf144b9
SHA1bd8743cf4dbbf0b320332ebf4f42b38491924519
SHA256a1724c8aba48b4a73b93dc62e9ab6d913f2aaefb1934bc77a141a12d267336db
SHA512b276b4d6c41af21d0a2266e0510ac11c4d4920946241b507debbe1a26c5e0f8fdf2f10783346fee61cef5949747f79320e443bdf0da47ade029306154be53326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bb44047769bc3425be5e13e136be581
SHA115f53baca40cc0448ad0e5fd28dbf01cbbc0c034
SHA2560b3e5a324f931d78a607cbe43b1f79de27112dc14a8567b61a4173d26a25094a
SHA512c1cd2d7f2a5d9bb372dbeb67644ac37eda0f69e8196948c2d501c38b61297e7dd583ec7df86cefe4e8557b689a853cec6e3b07a5281ee8778b3b1b4cfb74a7c8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b