Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
32d57748a33c9b91805849dac7052873_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
32d57748a33c9b91805849dac7052873_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
32d57748a33c9b91805849dac7052873_JaffaCakes118.html
-
Size
58KB
-
MD5
32d57748a33c9b91805849dac7052873
-
SHA1
9e6030af114d289a87d48e10a6baeda7ad9c6ba7
-
SHA256
8793c0d975e67ba357b2243345baba61c983ed0f7f6f7d3dcdd66a472cfa47f2
-
SHA512
ef0774a4836748618e9dd25cde7a49377686335e5a75de2cfd0e29295e5c4da2992a87310d48b7e048a23f96572547503599f0f467df249e99f895d6275f54ed
-
SSDEEP
1536:sXtW/PbhxoVDa5gLj5a3gVk/AE/VEdVsoVgtv9VPZVMV0tMVLgpRkV13+Vk+jNjD:MQQa56j5aJAvKpp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000d18a1eda02936a90f4609e097b4f6729c1b42e5f8075e84ba628607b9075b55d000000000e80000000020000200000006835d247487ba8e0611cbc7ff4aba3f05e537d638cadf9b13cee455da0b9115620000000710959f318285742d42789908f584dd3164b0de87f4997cd03899ce89359f8824000000086086c7551eeae61100c590ac8d84a0a850cd2c47c9c38d92506c8aad369cebbdf04da6fa2c9831a3b4aac1e6b473fa15ce765bd547bb5918a746d98a8af827d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46A1D441-3E60-11EF-9449-66F7CEAD1BEF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426738737" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f83d5a6dd2da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2080 2488 iexplore.exe 29 PID 2488 wrote to memory of 2080 2488 iexplore.exe 29 PID 2488 wrote to memory of 2080 2488 iexplore.exe 29 PID 2488 wrote to memory of 2080 2488 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\32d57748a33c9b91805849dac7052873_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573b32a58b090994ce122e2fc2f153596
SHA165a76bfd891c279374fdec239cac0aa01c2a7b8a
SHA256df97a7ea26d7ef1d1d1f99be5a21be02625b20fc339964595e895c4f6ca7a030
SHA512e86495c5d8bca6c260616af45199b44764899330098c043008d8c097022b94efd1253dcdabd20d8a0f75ccd7c5b852ec1b72a0bac1c51afe58ae9a894d1e9002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5596f500ef14fb037f709c949f4ff4dda
SHA1a44f1e29e65dece102bbb5dd339acb98e9d811ac
SHA256360df6cdc03dd744cf0d24c2d725bc770be4ea787937700688c62485e13b0432
SHA512c8a4c94054f7516eb31ff3f66f46edd40420848bc18e59e86e20ab8bfacf546a19c95f0056a929724a8f901768d0ba830b9fdcc0933f97fefaeebce1f7098d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f18b680122de99dd082b16421ac6a855
SHA1b346dbf6fab3a6880ee0540ad00f69377047d3d3
SHA256d8d2bfb7a61cd397fddfcd630c2195a6fb474099c23078fa7e2d7e0b48eb4fd9
SHA5124462be31d9511e43ae0dc343537119748de5516d8de77e069527cc926e679129391973157079b792532ca0a7ad7ec342a5f4f115ac96dd7e4211c2545760376e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dd0f0192cf104501c5c9191c852abd6
SHA14717d77fbea779ed3c5fec87ccad3ef08d1f832f
SHA256bf38033f43423cbc8b94cde62156a6da1e213e6cd0d86c3fcd614adbc9d17df9
SHA51263c89d68573359674a011fd9e98c45eed5a72a9802388162bbfa4863d559c6667c7a7780a8eab887b542a05a83bd52ba0db16bccdf074d09901c94e1744fc644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55874e46e60a37e601e43e84acd3260cf
SHA12de099b3eebebecebc03be5430583b5998e26303
SHA256522aa84e21808323c51f316a577be7d52f41cb66259fc778c8f6e4de7fbe392d
SHA51286abd049f590e3704429f031a7d418ee7930d4e20a063d3705b692097d97d84b5d009f2293abb0759067b1ae1a76fccf0d37eeb25ac7c1d18e1524363915cc5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc18309c99f3f1904b99ffe8dceeb694
SHA1d9b2f8915b6bf24b0a2cbb8ae2bbae2e94a7789f
SHA2563bc4da0fcf9c3ba0a91384065a4093e8e002cd160b35ac8872b06ba77541d7cd
SHA51216d10595f4e4b54c969fb0d12d8332270ede044acbd3a0ca80e1df78c85883b2581de11729889c2849338811b1c2010f7f4daf7ace105f67e189238e0981a2c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5338d8ec2c60b5d98824aad85f4b771ef
SHA1932eaf52ec6b6a52ef57ea9c4cc4c3a4171defa3
SHA256b4f6fe06b7fcace88849bb2133d3e8df917b14d505d3b80ed5a45ca0b8938ddb
SHA512b74cea0958e7e0186a003589f30563faf6895d55429f1e03a4c2cc775e154aef8e16a25c0b52ce530b63364c99e30e7d35dac195cf5f7cf077df8950d2a653e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5077bd6af79927a21412827c183b1a7e1
SHA184a9601d9b625ba3c5608ec616dad31b1ecef5af
SHA2567f6fdcefcff26b0e56ac5c61c4ee92cf4712b3fb03f35dfc19c8752e09056fa0
SHA51209110c5adf1d47f1c37629f2dafcbd6101cf1f9aa2e85a2dfca17acd84a17294378481b4a5b571203d0aa69aa11eb668ca57a3842cc8c2a017ca62a07baa4420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595a60bf5e06447e56ac431b188f5db63
SHA11b1529a718cb3981205ee0c10316794d1bc26413
SHA2562c8321deac91653f82c8c295cc16bdf3d934f85360ddf2433539a8e59e064219
SHA512653d90c8fa5d68427d6c5f3f9a5c96bc49cfe8aeb255aaeaa86d12e8ebd7b3f35bb08bcf9350ac86287ed05b1d5cb5e11effd2c03dd9f0d6c544defa215c5e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d87e3c3e8d3d5cfda686f0c05c7d1e07
SHA1d8015d3d9436f4517cb230c63621b3687d3b7267
SHA2563d9c2a659526d273b666f6f78d6b802a9d50ada4b7afa43f0b3fbeac265cfc2c
SHA51259cd849ca4715bc7f234347db78425c58513482050d62f29e732bfea35525aacec737b293519e9a560551a03a8ca53247694efb1e9c24998d828da56c59a9176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd436df6b7800ffbdf24f7cf75c74102
SHA15e5f363f3bd97b4d211948c58bab27c22fcf52a8
SHA256470519ab383c3618986afcbe0aeafb1da996f12c31229da89ea10d188b197ed0
SHA51208b444afb62d4e6e22bbc2b6353494a277519a5afe90dc2faae3bfe6872f7c8d46625762af62aaa07253510e0b81612a11263aecc8934ddb2030747d9c60ca6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb7f31c1c377e848f14918ce42cdd8eb
SHA1d6cf9d13d0c509b059e5ec29b527389441a3a7c0
SHA256fa36ff3f41d91b16b87df745b4d74ec4f82d9f5bacfd2aab297e1326a552a436
SHA512015a108db1baec395bb1b60fd6480cc9f79016fc17edeb3ad6857363db4363ae06c8567d0d13a7ce86cf9f04a29bf6b1335eda89a2eca37ad99ac94bfae9472c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cd06e0907cb9f7fb620633390a7fb5a
SHA1f655cd14767e0313906acc03a4c5a814860d6d6f
SHA25678c86f663be63ba800449f7621c8e9a40cc80ed0d80200a24942199b656b0230
SHA51228738f0fd7e0035768faa6437a62551bbc60622e4076aa4e1c88ee80714115955e8e8a131ef89ee660aca3c933776778d025b1e847751e2bfe38da8f641398e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be47ee0e86d03a1344b828c2050ec500
SHA123f51befa7ada284888fac07aacd30b4f383a1e6
SHA2569096d58a71e9d6cde33fcb8a9345bf49bb1872d4edd96f71fda528265f583844
SHA5121819a0c2b76d182a57ef98a1e77d5c1f21ee3ea8c17bcc2ec8d7abf279b9870c124e96cde7c25b53faed6d05bedb80a7dd257c2d32e4e904cbf6e632222cb9ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5dee2b146e6500b6d677d85f32b53f0
SHA1e9ebb56ac1a15f7c763032a9b4b2990f38fb73ce
SHA256ac2fef8714eefa23e1eccc851dd02f46cbb6f523839f0d216c8357be8c988e97
SHA51223c48751faaac3eacf0a69da2033b626b3d950895c03750d511ec45fb266dac087170505501fc99034a0752af20c3564537d1ec316f6fb2c77082e55b880adbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6709d9ab654934a9366c316ebe45a2b
SHA107449d855c6e0b9102e2805d59cb7a8670dc8407
SHA2562fca23516ac7dd0876999fa88d3ed405fea38a4b650c8ac3aba5beef03b0a5c7
SHA51217f4b2be14f22dec56eb19c3d665556e8b0dfd6b5e3c587049011b4a052f9316c3cb832ee9efcbdea93c197294453084fb6e3507f4d5602661792f80687a1ca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534b6e6d64116bf2672c510372c65a46b
SHA1096bdf3b0ca710c31158fe8f7ba0048a6fc8a8fb
SHA2561153c133ba63b08574009a2f6ca108d8a36024951369bb66cee5eaa001e4f2dc
SHA512b5e6fc8437f29e5d863293289b5aa8fa90b6baaecb9c653b8d4986b250213dcacf48852583d24cc92bd1bc92e88bac2236a693fcec24ae7a454ab514e77a2535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be208cdcbc2b4b66ecde718626ebd60
SHA13b3a83164f5e2691dc055f1dc7509e948cac3777
SHA256b47c8e2f734cfdceae1ae15f8ca12b7de671a6d2b0917511a33b47ffdfe6cf88
SHA512bf605c91f20aab939d37c46578a6581aa7775c7ca35467c6ae4a026f9d66b6e3779bd9f6d9675f90ac60c893c90ecb255de3f98414575a093818aa7777837335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a322c62a24c9d7ba64edfd7526fb880
SHA191cb154b9a91ef4e0860f25ee02f45a4869aa855
SHA256e851e674cf75f6dc6148154acbd1c939f962ee46391d1f917e1b348cdb955818
SHA51200d45712dfcb003566d7c8cd9bc794228c4ff94aceb84b2a11ccc334780a4003ca5536b2f0236336e4cd1de6770d7c9af6cfd4ba2af4088e133e5941d940e6aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501e8b7d50e91310d8ba0529ea416f8c9
SHA160b05711b42d3671ff2170951cbe2d905a1cd8cd
SHA2563478876ae617501f7d2e8dd8e41e0a2175588996a8acb5aa767856b732ed9fdc
SHA51279d61feae00e5663b45fce15121e8e04a270ec5318ee15a85abea8ca88a3582bcf53f56e91f7adaaa063297eb922093c814357c00db86637fcf911f9f305252d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b