Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 00:35
Static task
static1
Behavioral task
behavioral1
Sample
32a0205f39698be6d71cab8a40e4e274_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32a0205f39698be6d71cab8a40e4e274_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
32a0205f39698be6d71cab8a40e4e274_JaffaCakes118.html
-
Size
10KB
-
MD5
32a0205f39698be6d71cab8a40e4e274
-
SHA1
9bdffa11cb2b5c8840ca7b674b2a3f4d1d850824
-
SHA256
d8e6f19a4d001d5e1b6f94d0d656d1ace85cd60c2032da1e2197e80b58fbfb6d
-
SHA512
dd9e9180f545b71a6678fa463c6849895236858ddcf117b830ceb404e89f87f72dcf4ee055f433003a1df91817468d25ed149f23205c85947841d928a8fe878c
-
SSDEEP
96:uzVs+ux7m6LLY1k9o84d12ef7CSTUVGT/klUpM85MkOLomUkWj3lVHcEZ7ru7f:csz7m6AYS/csMUcslNjPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408fd6d561d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426733893" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF4D7CD1-3E54-11EF-B9AB-7EBFE1D0DDB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000006b17b15d49dd2306796c1f243422e5053f2e47dd25917072462b6d6a7752fbeb000000000e8000000002000020000000f3e6909432794df0d4c568b6c1f8f5e7ee9d20a4db2ea3d18eb10a106e8956302000000020a3e0aeb0e0badf4c09a4539629efa2b4a308106149bed39570aae6f311beab40000000eb63e281bfe50aa13db4814edfa742b4e1349264953bdd7a4cf77f347c15ec941b3794bf99016bebf9f17cfcae4298cb9ec377fc867c1b64da71879b360f2a69 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1424 3068 iexplore.exe 30 PID 3068 wrote to memory of 1424 3068 iexplore.exe 30 PID 3068 wrote to memory of 1424 3068 iexplore.exe 30 PID 3068 wrote to memory of 1424 3068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\32a0205f39698be6d71cab8a40e4e274_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5320a68991a1922e4fead0581cd9a841c
SHA1b18e283a10a5cb8bf26d4720c3f95a5f5d55653a
SHA2562a08507abb5ac24e41fb7b5bfb863cea398287c134ef5b15f01618b1b965a166
SHA512e77a958bd3c26dfc50b7a08cead57b1fda44b8290b9576c950b1891062bc14c6ab1d0f44dedd0430d40a4cbd8d8bcfe614e751a088a54532146eea8d9c7d4a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c437bb44cff24eae072f90a698afd1
SHA1c7e601b6d8dbc221c38eda1f4fd619ad762a94f6
SHA256c7538f811e6b4c588ce0146f2748319a9f1fdff0f250268b7f1b6f9b84613ed0
SHA5129ebd4d484ae92cbc72618faeb9848852b3876d27c4a08a9509ec17904d40a968fbc9b2cdf987d28c901420cf61ae5fa36cf7df9facf4a7b591b3825fb205013d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ef2e169a0e591875c15b8797580e9d7
SHA1ba891b7732b006c014b41174d99094a980cedf96
SHA256558c96bfc2e07cbc9aa9161b54facf07b623150807fe0c8099b9aee32e2edd71
SHA5121d7a9ddd9ff046e112704500421d5d07e4fe2c8695f21425d614eabcc6737ee9f55f796224c37cbbdbda65939d92ec0a39844a2f5db50ecd43f84028ef78dcf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be9bbbe38d259d046f49c1bc9b4e0823
SHA10ba73898ef902e76dc904764f4575f84dc34a41c
SHA25641be2505b19e4b34a01a026dc76c5f23c249f8c7ea19742a00936e9f8e01c8e1
SHA512c7ebb6714599ee39e9506e24fe4bd66ca6228819a3b482292695d9d2eaa932faae4acbf897cd1e6ee47397f6e5f0c1bbf8e4245f8a8159561dfa6250090533cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502f6a01b661463c735b90f169f559f4c
SHA14275b1d14f435ac013b88683c8bec0c8a9de728e
SHA256e4e923e461a1f2e6ad3e578a1e9b11e68cbb38668c14b4c827ac53963f264365
SHA512f0506425e6c2e7d2f39d1979dd64931102114285348ca8a0b8a6052d88afa2cfd0ae2ebcf14ad0380453100d95cd584ef5caa116755b1d7e016c73e931dde232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53962823d98fdc55624d1b610911cbf1c
SHA130732d8e3da7f1f2eb5e7566b0aeba17803ac308
SHA2568fd8bfd1f7736fff7f3635e563711293925970da788712115179c941ec2b82af
SHA51236a29dae8b4948a7be31aec27f0da088e95240956ba650a08510c0e43ec0bf361eddc0bb5085be1e6c20685d427e332e9b613b8ad5db0a85baa275a5479a16a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c42aea2970da108541dc3556f1aeece
SHA1624c3e75282f0a21193348445e01629058d9a0b4
SHA256c4d7161d1a2d529e12e619d64914eb35bd7e49d3334a4c8f816766bcca0441d7
SHA512c08f5ea72cf8d8c01f3ad85937b032ecb2a4ce2353ac82c5dc87a16dcbe6bf3ddd2d8dbd363974531c695e1a0802488b17f53dbb4decd0c74670d9ed31b32484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e12bbb3e61fbe433ef7086535ab96ba1
SHA11528afa842a3f944c182f5ac5ea7c0c835a4f2b1
SHA2562cb1824ae80d353cc2b968bb873a507ee4149e8a5fe19b7ae7b87ad2879474a3
SHA512dbe3a07e1171bf461fd726d73f6017f02624c80b3fd2e9a7d6e2e5a2d76130d4464a8b0a56b412c5e0ca2de6f93d4a7215806b3758d5308533afd4ffe9cdf452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed0e7912d439ebc639f826437bd72175
SHA197d723eb8bd275f8feba3d43190f50cc321709d7
SHA2569fafad4167ea6ca78f5850c572ac04005f5bb85fad26ea24297b23c12d599bcf
SHA512fd3bd78b69c6836e3f74707b8585d4a49e3a31fa46f3b9dcc9fdfdec73946c003767537c079c01809280e73a572e67236f3fdf094c202fddba28d61187713a29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c314a518ab306ef424556a46bb282b0
SHA12ca0992b6d4d972e4b5e6cce29f72435ec8bcad4
SHA256814646b092bd165fa256b1721ace67791093f91555c4d9ea8aacf8878c1a66b3
SHA5120ec4002d0de9e4f1f80bc4c0163db4dddd98a797cb7e294c686501c79d901d88dd81ffcb8e01b48194e0cf515e88c27818e9b5240fb2756c30068e6dae7ca5b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5889d271e4392b4496cd72f0d04c37973
SHA15934500c8b9797df917e77ec36bf2e9ebaf8f8a4
SHA256d6b68af285abb1d9ae8415152d835cb98b0ac212ae660e19860e089a950656bc
SHA512b0f35a66c6399b08d0143ebfe511cd94ecd1ae7588e78a4d8ec70b5c518a6d9b21c60e3b22c03b9b794560dbdb2f2604f3c7973dc7c962a6a8a0fec2f4f96b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f065910a756687870a1e7bbf3da6f4a8
SHA1206fd54ace3b32d8c20ccb7caa79b2a921cd7ade
SHA25697796941e8020c501f3a9cd620b063d1fddbc3d7f530f37ba4910f99dbed8ff0
SHA512338aff94d30fb80d92d41a1ac0bec6c7ffa6ed51402a9b92287ca3de5412b5a2f8ab743b3406ea4ee2c6d47889e12b36a0e33e019826ed45ee0326e4703881ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e702e948d58d7f2971e236f649ec3d
SHA11aa51e6652c463f8b20bfd7ff9778a4208dc6094
SHA256965d14e7405fd72ebf60811a871e688806082c247d135445edb7d552f7e0efd1
SHA5124aa10848fd7fea6af1425041433ca1e59b35db271e89d46623ce9d9d3e4603d6581978b94b47180cb672805c9565c93331d8f7bf84bc05f5be3846bd37fe8cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1dcb5e8ced78e402e26823823ec8993
SHA167180e89850b96e3128267d36d9bab64e96b6be2
SHA256ea0d20ad5e346527dbc822ba3cde81a73ac68b7f5e1030f6a5ebecc64ee04203
SHA5129dcec099a30f787b8254fab66f85754d2553a135c3510547ec420b84c26edaf1794dc8549c117bfbf6b3a6e75da861646e81b347681ffc8b48e5b3558fcf559c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a532c0ca913c9cc0e1f0cc437e8454cc
SHA141fba847488e5d49a070a8c347e9f5a853ca7ad2
SHA256d65191e3725170ee20afc4e7b2d067988e15e6a2642a65454f04d1f6a79ba5c3
SHA512f23aa18dbf80e2e9ead22cdfcf52a535bbefdf40c1bb1bc5b80dbb1cde0a12d829f2b07c4031f4981699251001a3e775f87c846c3cfae308f5b4616f89b4b114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567073bd0c26412e9ec271fcfeda1ded6
SHA19ebaa872340d8c1aad5c2020ff25a8986e869d64
SHA256668af166c5d02964056418b6d2261cda109743afd1c9f05332358ccea0721fb8
SHA5127168f235fb5387bd20e9f1710857511c8b3adabe4cb72747d097ab948d10be019a167508540554fb92c9b36269ebcea59d5305a9859acbd7f80ce3a0d66b1bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51634078025a6a3e292d8ef3996bb28e9
SHA1fc0aed5c90cdb1271902f68bc2a60732d825a869
SHA256b157bd0e92ca7349ed1a1621b24ddde39388befa9e069765951e6a31defe7108
SHA51271c40da9660498479297b4d23f1249df032df00f1767a04d3a0cb66b043012ca55aa9ff3e5b8bae2c5a5a1c14b050cf74615cc1ceb18ff8c1d8aee48295f19b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544a25ad01c87460018359733ad36e4dc
SHA1f1bdcc8abe4b347dfbd75574d4506ed96967a161
SHA256c2cd4370c410935963eee7e2419ff5368dce768aef5ff1df89b36ff1353b2519
SHA512524c307b64fe865c54139b037f3326d6a74958ce2911019b6fad2d0d6489d7f2aa7d8e88ed11b9247d5a10414a170dcd566335d292f5fffaa3f7afa9d1429059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52644aad53abe21c5f465b3a8c6a88d2d
SHA13e32151c1eeeccf4f76c40e46f0df2a99d81e7a0
SHA256df09412e1755be37b69dd457d17203f4eb23302a97a723f2e42f72aacbd84f94
SHA51236d6bc3f9803535e45e9d8e7cb6d9565ab04fb51480b70ea3e257b5608e221a48150f9f5e38b47a9c59744398ecb3cc7d2ed86553c16f116903a6d4dc962d172
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b