Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
32c02c7ac0f363dc4dfa2a4c34844afa_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32c02c7ac0f363dc4dfa2a4c34844afa_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
32c02c7ac0f363dc4dfa2a4c34844afa_JaffaCakes118.html
-
Size
913B
-
MD5
32c02c7ac0f363dc4dfa2a4c34844afa
-
SHA1
3e0c6d700b8f96b392780fe88aeae7921057a866
-
SHA256
dd9ab8f53106c4ab5b33e4673acad34aae667d60a1d29590240070e56582ce5d
-
SHA512
6a8514892f1a54b3ba316358c04a4876881c8fa77d0b31edb56f6200cb1ccfe13a555031924fce539af7e5280e0dc40e68f29abc5e8a03e9a5f9f31536db4c4b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80bbde8b69d2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426737200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2813421-3E5C-11EF-9232-D6CBE06212A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000016ad59e9a224960a33e0cc9d87f8efedaccb3604e943cafc380e29e998c3e2e7000000000e800000000200002000000040cb4f84e8c027b1d5279eb8cc86fd391b63195c6dc0f87e4d08544561e06e9520000000f4a1fc5f5256c33fce497fe1cecf33f6320149294ed2e789c1e1256841bfb5ef40000000a7d6c3308bf3235c8709aef9a2939aca676bef5ba4045125394f9be85998ffbc7c2d49caa00c0dd4274f429c4ee726b6fc8f4b057562c4929522cf69ad4adff0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2400 2416 iexplore.exe 30 PID 2416 wrote to memory of 2400 2416 iexplore.exe 30 PID 2416 wrote to memory of 2400 2416 iexplore.exe 30 PID 2416 wrote to memory of 2400 2416 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\32c02c7ac0f363dc4dfa2a4c34844afa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58953dc48668a7cfa65f098918dda4266
SHA1155b9cd69e2456f091ada61eecf56c3c33a54d48
SHA2569262342d8207907e56e091ae3489e004a36999afd951ef641260a0b2e45cac55
SHA51261fc4a1eb242aecb4da1cabc6003a7f1f5702eb9c47c598f15910774915e69834d6f7d1c4de8b2b6ec0713167315e701998f744446302101e21ef10460927df6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee03612dfab580ca559cce66e79a3748
SHA1a9f13c32c97d678cd16b0d4a686f3ae0290f73c7
SHA256286d3d4c622a7668799bef9c612ecdd1b52d58102f498986c21068469f093289
SHA5125c6b51685b087628a70c9aea94c6d76261a3a9d339f99e3fa41c5d70b746efe5afda88927976193ea51f551a04e46513e3682d1fec217e289dbe99d754421f54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5959747a1e0bafa7da3de27fdab32a2b2
SHA1bf0b0d54e3c9ab33cd33e202f5436b6cbd58a000
SHA256be2c527454bc0358d0ad044ab7e910db8d09da008a85775ce71dd2997c174841
SHA512e1cea5429b39e779b9bd71e0aa90d057827ae300667bd0b0a440686a10cc3d790f54634ad880bf8aaf4b8be86f33d2d26bd0a7b1beaeb7e2d60c03d1bf235fdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56428ecf81f81e9f33c230d1a00523b29
SHA132bfb67aedc1ced869af8c8136c6d99ec8ac47e8
SHA2568bbf174a2aa2d40a37a65e0d8a889262e86def29193afc5b546bbb2d7bab3385
SHA512c9cf9df8cf9186467a92c5244cfdb21ffec4a07d17f31b2b0700b94b6d5c55addc657acc91f08baae6363e2f04f5f1a9436fbed5f96ce0da95626e7897e5e6eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c1fcc5a30a2f172421758909dbf4338
SHA1a9b14e398d85fb3a0a35b17d72f746c46eddfa04
SHA25672319caf51c4cccd7e2f5cc24bc3cb72f8964ed73f2eceb5f11a412c79a0c011
SHA512dff8bc7df7865c3725d15e778dd6864a8964f874941fe45b74d6ac729e84cbcbe5a5e26aa488b689dc996cf65fda178e167aa799d6366caff0e19f1b94e59f2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65221e1d913e2a85aa4bd5d8986a4f1
SHA15509d8e15c5ad4ca96d2a5580f10bcbd78cbffbc
SHA256830fa8eeefbc418118f5cf60857e85c1806b92fafb43ebf80647d5857ba8da9f
SHA512315f5c3f3baed144bd78c667cbc5a8a0305100afee9bd763b690bf494c59b64a36e180b96ca81f9ee9332629296ec679130cfd98dc53f8398ba032097744c153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ecfbcb127a6823f6fa762aba5cda0a6
SHA1437f5e768e06204880c77bf8436e85e8608de4e5
SHA2568fec8d61a4d4b5f2f08bf92791d67b849d3afcab9fc3ce17e9d9d64977a44b92
SHA512dbe7ec256ce15d2595836cf9debb9840fdc3f2ce3cbb85c10f74be2ca3a2209f8c1dce79c92b75f6bee1773b771d07f6920fc779207818722ef0f4e510024f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c435ec4cd9224ff23c14c140027dbc9
SHA151ba802c2a6d9ec6a9f1528ba455a3e7a19965fc
SHA256105784128cdfd0d8eeacf7e26103e0748802e057336a35c45fc23e7ff49db9be
SHA512b942a976572f41838f1c3456176fc5c0180c8c7911b7e411eb4aff6dfcc546c3d116d9fcab84c470b4b32616879bc83303d75b060a3e6d68b3b3346d511efb1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea494d5d1cfaced8244cc0f26e60e28b
SHA1b4bb973c1bca89be5c9c45aacff6d3c9a4e25273
SHA256f675ef0698583231f45367914b513246674272d4e120058a03edf4147b60fab7
SHA512a772fd62a500547ca84be8f8e98f10c9d15439c91739c983e8c08802e7e426af83bdecff6d3be941625e1feb47d2acd874dec1a3fefa8ff951e3d679e45faaa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d3848bb27df1ed7d9450a801c4d97fe
SHA1238d7d38d3c6598067d3a316a797cfdfad9f2f1e
SHA25644266c27813945f002e0a7b57e9700591e258dc049f1a7517975c367432b3579
SHA51204c2b23df8b643bd809d4c532d58b015e80a13a6b4ab1edc07d9e4e94e984be656d9a9653670c60b426547991185b92da5be3cbd2550598cad9fdf2bd572af56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bdc205e611c4cb5715bb2dfe4c4d58a
SHA15f10127ff08d370e3c40a6c97d23e1b505d17f24
SHA256f8abe650c69c8b42a77c993d0004f6827d2463388759ed36aa04acf804340acb
SHA512825eb3ec5350e579a23a4df48352b97638c8e451e031b39c8691926e0b4feb6d6cbf6bd4ce4136931849cf4840151d1ae426097ea171a89166c25ba061015273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ffb49dba7154d8af5cbf004b67bb492
SHA158d0f824148af1308daef302cc441484a23a87bf
SHA2560c4a35b82af42e92c8b44176f8c4329e5b7b4bd249b575c3ab27de8384e852ef
SHA512ee0750c760e3dfd25803b9c4d1c4e6a04e8010a8c7442395452e1b31cab208f2106e56d7b4f31c4df670dadc590ca326aaebc14b96a52a9b79580de105abb679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c2e3e90b29c89af41f855e2a1d242ec
SHA1c42645dc534b9f300f57691724227f63c7c1c77f
SHA2565e953fc520f6cb0a9e8d6392cd0c26d9c131c31742fd137df2d3c9e497d9e7cb
SHA5122ccad1b7b48d87ea9a4edd016a91e6f1ebfe6cb17ee438bc314b429b205d90078e0553aa73d52386063964ad96f47d687ce04a67903351d92735efa984684b63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a41af3e29ab8e07c3f8864b56fdc79c9
SHA12ff6914c82b93c1fb28dae50e6239fe94f22fac0
SHA25611b1334b44418281fb9091da01763c71b73681f90a35113e0c4f08bb58967996
SHA512d36ad5702e1d2e8e8c82ea74d4bae3b992df85fc33f514b08f177ca4033d39cc8611204128f4bc2c6466b3224d729c8a1be1535c58aa6d01e9a14d138df09dd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5342add73fce70253d89ccc8aa5471d48
SHA17942232afc32deadcef78f008a5f6a86a3edab25
SHA256c43dac056de0432236c06a74a22903c8ec72d45fa5709fdfe173af4c64583e26
SHA51225f34765689b09adeb89dcecb5f26f4941d28f31500a4ed9b77cc993ed4da61666999b06bb005de0693a7bcfa9e15cd450f46484434882f45765ff3a62625946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5086de1eab7ece7a3e91cdcd50d18099b
SHA1845a5a1f1900d25e35e8ecedf7e0a04048195e06
SHA256fd50221f15eafa3063b89dac0b5430f7ed59451f6d0c60646dd8d4e3bb486cee
SHA512ff98b11f3910b870c98410009a497dbaf6984a133588aedc90f7cada91071f83d672c65117438b853bc8da0496414f24e8bbfe70243f3d5bca8148c9bbede04f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d53ce5b81f4192205ea4eadaf3f1a6
SHA1b9be854c679b0e570944217fc9de255c927bcf87
SHA256414df403ef736e894b5a647a26dc52c4630f802c28e9925faa531ae03bfe7539
SHA512986bb4e6aeab611348f8fd72c769f6baa35ce7d973b56a8c0489ab0829c6e9c57dc56757f876274f1e15f6fe19ccfb2304a40d30a0f5f5a3250550e327b5772f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513d0aa2c23da901e1185931bc570c96b
SHA1d7169b28c87b06bcce2a64d7482de9f2dd5ec379
SHA256e36e8465fa86bf1208910a458cff596130e2828ae442a2d593f51d317b608e24
SHA512c1708697e63298a98a7820473a32a4ad58129eb675ee31e5485bbf92a5e6b40d4e6acc77bf52ed944df22f2bdffa18a7b28e5c3c98784fb7d121e98e8104934e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653d6c53b71686d25d28e242fa7dec1b
SHA142a7fce0ee838997b76322bc259457ba7b4da623
SHA2562ed3ac00f86e499130939f263f37b9f48e88955d6939d8300c707396d52b3cc3
SHA51267ad63eec7679ac0b66282006665d376e6af07b847992bd1936af7e3dbc2945957cd63fa931094d3eb026ae797cc579bb7f353eabab6d900ec6b652abb836fa2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b