Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
32c256122fe0458723148a054d28d39f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32c256122fe0458723148a054d28d39f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
32c256122fe0458723148a054d28d39f_JaffaCakes118.html
-
Size
77KB
-
MD5
32c256122fe0458723148a054d28d39f
-
SHA1
2baf3ccd0966f231e160073341f4c2be27835a17
-
SHA256
d28ce25d94d8cf3cb62c86ad3fef23ccd7e1c0a4f5790ad62a2f554ad6c5e424
-
SHA512
89ee4b444c0e151bc8f94481697e3f9b2e05e1d873755b4150ffd6dd0da9f37cbcbbade28faf21104e9aa4411ccbe29c20730b4d4f092ef8aef3cddcc7eea80a
-
SSDEEP
768:Zcd9QZBC7mOdM4fpC5I9nC46+TVSci2/Pd:gQZBCCOdn0IxCCy2/Pd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F90A2381-3E5B-11EF-B190-DEC97E11E4FF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04d0cd068d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000fe230154e90a6fdae0bee7f867c56b336fecf7164ace76f64514394e4c787811000000000e800000000200002000000052863cdb263ab16794b47aeb4d0b5be5a43c24a7552571c0bb7ab50ce93b5b89200000007ff234158e1cb267dd0374f4e4d65de6a2fa8bed215549a4fddc00d930862e8640000000f23ead12f2817e2730ad7f3e28c8ef19b1cf0b4b349a6dd0115311eac1d768e9f4d0c28f88163d5b4189a16a9f5ef4f56661971c67b8c7f833c7c2d301255e05 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426736889" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1172 iexplore.exe 1172 iexplore.exe 576 IEXPLORE.EXE 576 IEXPLORE.EXE 576 IEXPLORE.EXE 576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1172 wrote to memory of 576 1172 iexplore.exe 31 PID 1172 wrote to memory of 576 1172 iexplore.exe 31 PID 1172 wrote to memory of 576 1172 iexplore.exe 31 PID 1172 wrote to memory of 576 1172 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\32c256122fe0458723148a054d28d39f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ddaa5766edb059b804b8af990e741e0
SHA147eac5f601f6f7be5cc94afa09578cf472cfd1d4
SHA2563068d418d43dd1793e8ded325cdddf2be3be95d33d963336ffccfd1d3e506a9f
SHA512131acf53686a2f65bf8be9459d8289c7e9ec1fd9f97c16b5c22c79aa1e283292a44af73a2b4401c23b499d9418cb9df54dc602f21f73b2a96301611b4e602304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ba06d680e40df4be1ff0db4b95d7423
SHA1b6f718af41d9f262001974e5aae7eaf5f3f78115
SHA256f0427beac2dad809e61285c12681a9d3449635a5c7b9b13de43cfd55d24e3df8
SHA512bd4a842e9a9fd2fa127cb8fc54914b96c90e8e321bf00d943564061ee498951d0c06094a26ef2a7edd202092a10edbcfe4b8773573c0368bc9fa39e265c3f664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad5ebc79fe6736c5cd3da224a8e13574
SHA18e3c720f23914a2e61af32279c346a2f7fa47c5d
SHA2567f1d3689ecb63167987ffa6524e89a61d94d423691e64065e8fab8217e628981
SHA51253f0b2b17c58005d7cd48d9bbfdb79d7fa3cafbcac8a34941db696dac417c7ceceb12c3d76b82ef44b02f5a95289156f7e0dd18b9035844a5d6c5a754b64dc21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b117d33051072fd43f9b1ce2d21d4a6
SHA1d1fe5ff88c3841dc9c5a47b213e8b30c3d49b0da
SHA256e2cf030855855adc39914dbd2c926ad241322fa13b9d6bf1aec5a4fd494b0f0a
SHA512fd2337bf7e2fd7073f4a53c1e543b26713a8777e903681ce9c8d5af2afac564da9301290097f2258419e3ac0d2c32244608169a7d752503f3e9893f63d7dd082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c106a3ef2055187e1f47dd7b4bd9ed1
SHA193cf777530a5e764be0219f6cf187ccfad3af54d
SHA2562baf144d071e7995858ab6ddaad84dde636901a3551064200978398e85feff68
SHA512afaf811ccd963445641471352f81a21a0aa7b28a13af1b2e25dc7f27d0f409c4045eee8859e4b2708f865dc17a8e823dc6699c824f1bbc913566518619896458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca7587f4d9bad3b3580ed062a2d21b08
SHA13954de0b6ee1acf813938dedda5e5b2b30b1e6b0
SHA256189a95fd30940f2aedd70858f43ef0fd01c3b4d1a26bbefb108821fd133ff9a9
SHA5121c8bc666f20336f8462622590708a46792858b2e31d05554c5cadf51d9b834c78f935e703a5776fa7b4ff4a5f83d3a0413f85328fecf8b8071e41fc21bbed2c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526c35d83235ee98d0de82c099943ddb1
SHA1ee04944ac17f574fc6478c0d515203ab761cee1e
SHA256eaea666b2eda3e835ea1a0ea51a99533f60715cf711d5a1a71972c86e3d0a64a
SHA5121e38ed0434c8ff0fd6e52782defe0846cb4bc8dcc384bad00eba1a579627f2d482a2b5e9962f927709139cd996b4a23f93cc7393c1f85d3090b26ead7711e8cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530fa93b68f99175c78d55e77563c268e
SHA121dde10300255df10680780dd73742eef0253edb
SHA256f352aa67e37ddf7ef4168d4a01760e70a014b528bf0eadcd7b4df6981d7a3da5
SHA512d31181bda930f41cd886a167d5ffb99970322da25044418d8349e1bfe40a8e80f300346bafd0d72e6c36aa9262979aa4b26d503ba43a56047d9051b9a52585ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56008c340777918c9d5881e0165279441
SHA1367abffb081b86af03662c29733de5cec9809296
SHA2569221117446088cf4e6d6b41d19352251e9c62c991e3389486cd98e4a4c6fa9ca
SHA512fde6759e4bda84d2d21092f120e4f40d87be6cc13c299086e8606f1855343ddb2d6161b914c23265df9dfb07f29cee864e567f845d34a6fe3ebf1540d3ed4710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bd03bbd96d68a6180d8f320ba6f4785
SHA17d4cededfca28e6fd857e3faee4f21b667633737
SHA25659b4cd382546f1551c3274d693038a450ab3bcf23cd5cc3eb312ae6c1001e442
SHA512cba51f75815d3c64aad43db1955a02e7625c79f80f92c942ef9487fa1cd964e2a66578d3514060ebeb6e39b9d92085ab448f138ca248ac73497aea98f83bce0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5993dffee0b31fa425ff58666ab82eecd
SHA179c79e92eaad5e0fcadabb9869d924a6738d46e7
SHA2569f279968e524bcca112e04dd2ebb39c519c7e3506e0ebe029709ffbf0a4501fb
SHA512f55c8fe9cdbadc1416dccbe916eb6e55283a3cb057aaa4dace33b7560d40eb6b7c88be15c279bfa91b14a25d2de076f3cb986be419208f448bdfc9c6ed89c6a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e82b0dd04893b7e5558d2ad5bb58bd61
SHA18293021d510b17f418b9e9b84c2112b19ec26c82
SHA256f91a79b065759bd68e7153cfe04f32e9d82ef1242c3679ff5574a1ce86120639
SHA512c2ac7ff227367b143ef02545c7caa07f67404262bb95d51d7cbe31d98ae27a24d826e7a9cc8031c0b866a5969e1769d3903b1d6a8697ee9effff4c47dbd3a441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c3ed11cd739028e8fc69b5ee51c8a97
SHA1cf6707df9fc4ca9161fe6d2e36a08f9b163b80e3
SHA256c4bfd909723ffef9ac131f7ad8ca832188a11b89579556998d65ccb6ee4782e3
SHA51253cf9f767d23b9243969e5ce3a60472ec868dfa66f9e7b43a6e2f3e455d9b6152790fc477880f68e858d9eef9af42296ed3e4f911e6560c3175feffed3ea3619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525a2752ffcf6fe9a2defb2d23a0386e3
SHA165acfb1bd82aab5dae1ff3e4e6a137668c532e32
SHA256f63f0a0aec328641ae93130eb450de9fa083d4caeb947deb1c2088401c769862
SHA512e8bf6c413c9022a4e85ac7a1367312e7e9da68d114818902ed86ed844514d516163f3bb223bf51525e9185df70f9130f260a8319bec9b11efa07db8b0b079447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560c6521d478056865ee2e25f7c15a4b4
SHA1599adc7a1a3bb67fbe6922e86bb21b9483d4bd46
SHA256610e5d8d211200a11f1fc2cb5fa66a5a47e52c7035d7a589033d9a09594b5bfa
SHA51215cd826ad78c2bfde0aa82fa623291dd2166e5d65b7a7dbe222d43353e24b0a9c4b16ecdc405e25931575c4c8c8c93117d754b7e5c2c4c4c25d71614a14655e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c9811d8faed898eccd0576dd0fcba20
SHA1c3d2c96b448d2e8bc8a2daa1af4da9e31cd279d3
SHA25698f33cbd8172da0168b7cb289ce47b28c9f96fdc97031952ff1e451a9308dd08
SHA512f91566e1019ad51fd4307ed57359e763545cf58b5cf83412cb8032bfb159be12691737fceb0afa0846296870547caf5b46fa873712fab56784c6882d3bc22603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5004de6c15209a8c5f1d962124a62e0c9
SHA1e178bcebf5b3fb0c8f35c747bd82aef310f81cb6
SHA2562148ccabff5cdfa79ade2f91353162a513c99a00dce75c16df8f7829ab8fc8a8
SHA512664db265549289488d15596126d5c3a333673f8aa958d47b524ee5efe2c9b66b34d15150ad634864541862403c8201d3ec7a0d9a261c097fef45040efaefbd43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582abdb976ac41e678d4fea1821c42448
SHA155f4b053e2d8d0d64f1754d322ed3b0ec5ec4401
SHA2567c27afb3885fe944fadcb43452061925c727099a93b0ffb23a8a8942cf764bed
SHA512df8b31394b308f78dcd2989455209fec8eade12ca3d6f43ff0f7c9b7e8fd473ed9943189bded1413598166c4468193fd1865b213b8e1c869f135be81bdeda1a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560299d6125d4b289afefc3e52aee25be
SHA1eb37d2a6b119b02e480f5793ad08cdf4d930d179
SHA25618ce92de92d6d0b534aa9a5e5c93550bb716bca819ca9f462459ac02b82e6a21
SHA512b0a711b8c12270275987acffa77b90b25799d7defe1c01c8dbb788726e9d0b16ac14d32574f8c9293be6c9c24ff6208577b8cbe94e55934da53a9b017bf4d5b4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b