Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
39063114996c154e7e602831f599b988_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
39063114996c154e7e602831f599b988_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
39063114996c154e7e602831f599b988_JaffaCakes118.html
-
Size
6KB
-
MD5
39063114996c154e7e602831f599b988
-
SHA1
563c791a41e80222a1f9f83c8473a63bbfe152cc
-
SHA256
939cd1e4ef23bb2263fcab48344fe3b3dee46246ecbd5eb6116c8058b21e9c22
-
SHA512
237dd01b6ac0d757d72b2de7a210a32c45b4a634e5e1c7009b204a41dfde27f39b6e4cfac27e8f64d7f939c13b14ac9eb137726e399f3cab26fa94a5df72ae04
-
SSDEEP
96:uzVs+ux7d1LLY1k9o84d12ef7CSTUeZcEZ7ru7f:csz7d1AYS/9b76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C7C3251-3F7D-11EF-B985-CA26F3F7E98A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ad0bf389d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000094ced29b86166394f97fff4eb5a57dfaf0cd51620b6fc2d1e558c058bf3697c9000000000e8000000002000020000000977f6bf229bb5b4238b9dac9e4a2c210a04115c651a5b151f2b75d3ce15dc95820000000b41457bc638a234a3c841c799a8a8c633684093dfbfa7ade19f6cfeae7ae4db140000000f1d46dffbb12ae3591fd7b7f59e85ae47bc8836daca176370ebaae219175e06f891f4d1d4a682bbfc6457ed4337a147cd351ad5120936c91ef79f9a1d522a5db iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426861072" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 900 iexplore.exe 900 iexplore.exe 1520 IEXPLORE.EXE 1520 IEXPLORE.EXE 1520 IEXPLORE.EXE 1520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 900 wrote to memory of 1520 900 iexplore.exe 30 PID 900 wrote to memory of 1520 900 iexplore.exe 30 PID 900 wrote to memory of 1520 900 iexplore.exe 30 PID 900 wrote to memory of 1520 900 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39063114996c154e7e602831f599b988_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:900 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54568474e0e257d1a7c01df6d5be621f6
SHA1a8864b5dee9a899df7d948a8a416add6fcfaff2d
SHA2569f663f01deaa4e06d5b518b88348dfb93a6330d233002d6739838c6577e4d59c
SHA51258eb515ec9937dd6a9af7437db7603489db32ef95f63c3e57c0d725c3c77c0a8c9a50f45160ea769f2c7c5a0ccd51dc620be7abebc3d687892aef6dd3980fa16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f6947b60e8fdf07835b25c13e8ae745
SHA1d4987351114dc169024349da655c608963b289cf
SHA256e1bb0d81699d97081256e71c74dd739ab417b9ae5f80f7f62f8e619a3effe9cb
SHA512fe69730b8e056c7ab5d01b3b5328192204ccd855c07d3e7622e3913ea3ef4eef1f453a69b96cb1e8e54f4b94ab5d345613aafab2f8e871123f444b1dceac2f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503417d71249544e49b72cdf9faf25e0f
SHA1f32b47b05b82664cc9807802b93252e869a7632b
SHA2567a2f6ad298d551368f740e9bbe2c350e1ba4e07dd08d4048bde0bba30241cf84
SHA5122b0f0e8a58c9a5b71984e5eeb25ec5d9cf0f7ab0db8fc2323719125f5c001a1ec1c786b149db0ba9bbfc5b966b9590e7aabbfa22185ecb8efadfe2756fddc100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d401dbf45b7d521fe0433a83f3b8398d
SHA1b310c82c1ff8190729fdd167accb95bf2c32a343
SHA256dd4cad25d53adfeafa38fae475b61d6f1abee847d8623611e1fdb3508b80435f
SHA512c296be2f5be7e0eb6b7e164140dbbd72e8db4dbc69761a0217749e32728a145191a3e79117a4335aab6fcadf2592798ae0390790f20ad84d76c39a8efc62d4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e315e87e97a7de0c9dd1271f423d74e
SHA1710a880987a51bfd21107ea913986f4ebedd5418
SHA2566d992b31f6890b8a17e38fab87f408284b4b51cd050b1457c181d3c264391930
SHA512bc22b658603cc19a20d7e8a1d1d231d3788bdb88e002f73dcb717dbc9b558de25bbc8235f29371fe5257f8458a1d1412c6b61231e6004d3976e651023c39b1f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8946dfca8e02bb04b57deaf73ea3cda
SHA19ffd35b9d9b4fb7489dbcb35e5ead57155aab73a
SHA25668a8c02f6f4a8cf2762de0aad8b66740ee33594b4213fc834af854382524b887
SHA512cf15a1f3975632b059998801ae16c3d4cc39e18cf863a2c2ad29d8eb862765a535c5979166d5ee0b3610ead50e53e02750f4e9223da51af991426e026a0b18dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5302c1962bae91144267413e15b8cc45c
SHA19214ec8a19f2fa89711fe11d0f90dc8a603a4cdc
SHA256f9195a965648185895832089eb9c8431f89daedccfad8d6fea142f9035e91584
SHA512861b208f44c477b375261728c0e86134cf5d592ca555c540d22fdb0e98b3e7d90f7098c89250e299d6d06c59efceb05d066f75b84c9010d8820d4f501fb5a512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a254bd14e432ca555172bd92e4d48b50
SHA181cc9a7986a05b3073f8f38fa8fd3a93efa92a85
SHA256d1bc2cf6e316a3b2b8a4f1905997a4dc46f5d93a29f7f9fa19712827a7e6c044
SHA51219a35b3e582ae01e41c6357d698cf91fda6bd28ee30d104f515fcae05717a894c13cabf5ed1e9a6f1dd13899a8cd303e7ff37f67dc3633370111c1c37ccb0b17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549a1f738e04668e7ec8be4328c15b2a5
SHA18bb58c99862489551807f8e96597334929e31a82
SHA256a763a99a4b45679626fe360cbc8ff427c75c505b2e6edd0f453570ec3307343b
SHA512ef1db8cd20beff035828ba63a0c2daaf0439954125db1341d3bb2ee9bcbda80e0dfd59ebe44351cd0bb823eac089c77ee35eb9f8993e49c733d63f8920b6d726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eb1de949e5309946c455bd9dde913ae
SHA1d0ced8249325b7a4523851987051da6b3339b010
SHA256c2ec01568f3df915eb63a653476bdb2065692074e3c4b0fd826d52e16c08c16c
SHA51240262a7d3bdd6637bb3e885c813ab800608e8af79509853b9533174369636ecdaddcfd09aa18d924c37a6303a83054befba8bd34fbc0638cb98e90552a5bd00d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b9784b94b2236bab602e0bb0702dde4
SHA15e3da8746d993333c8d74b039b62a2378ab39900
SHA256994fa4ab9ad75394e7dbdfdafa2fc00bd1f04fddc20db9067a4b4f437062a937
SHA5120c28d0201ab3022975b51f57c54e51db93e9d89a0dabf6b7d1dbf8fd3ec46b7b4d3ad2be545110036cf77fa709d867e14ea67e0d697c3457e5590da25898a1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b738f5151843a068e6bfc3e9d4a4e678
SHA10733f54545ffa0128066b918c90cbab87642a077
SHA256216cd2696462531f545e2b04d30246926e2ef85f3952e2b74baa0227308c4382
SHA5123789c28df37e588044fb22cb583259a7de46e3e812926c854474bcbf06a0d8923afec3241e22fc3df1f5a44f6e099ee54052a955316a00a63b5b31cb1fb79c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d4721954cc2f807a4ec0a3603cb747c
SHA1dec58f08d576610f80a5b1100c89f2fae0461647
SHA25651bae93fd8d2dc7b7925b713b107194cc02a6ba1f92eda96bbb127850d8c61d6
SHA5128e13bc927ab33b5b9f0562eea97c0254a1c53439998a6a127843aa04d99af84459fb52982cc5524973c6a6277b203980a40a4257c2ce747d29061ee616b943d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9386e5600228fc1c56a9ae5b5c23aac
SHA107d304c937235def7df346681ce76b56e4108bb2
SHA2562742032069f5c1e6d57fbb02577126331e91193a6b1c5feb861495a501ac7319
SHA512e190518ae8cd2144bb70e39cb19a69da22e30828408900a4e7657530496d7fc3fa0d5d5fc9e967f54db5ebd3868928798d8c240ef09e71bad15b6ce8ec6b4f43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b40aebe054053fbd603d72ae8e402ac7
SHA12b42ae59beb5d3e00669168245b5bfae50a080bc
SHA2562ba86993c8e9db13746e8a29b688d434f138f6f5d876e4106605f7c25ae9a3a1
SHA51212a70000f40d53c79be20c11a9dcf0ff03ff61217d85a747e2889437b554f5cc18b2c7bca35e0f06e6499bf4f993c896866190f3fa2cfe35491e62f87ab34a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59995c09cbb5b981fc169804336dd6c00
SHA13c6e96977fc275a43add79c8dcf0ed01b9664305
SHA256971ef9d615488b82fbf96f711b1d264a473b20b7fce9cb7a54487991540d04ba
SHA512e2715b28f9ffd25ff98d13e48c63954b7c38e2ef0361bbb9db59804b04fe7eafa03739dbbd01425590f8f4618eed7b4a63f0f1ea36146dd4ddb39da1b227d710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d06a5f8fde11ab776e16d0021c23da48
SHA10bc4a38e251ffc69921128e1f38475567616a24d
SHA256de532e3af82a3da2fe53e711cd3c3dcf5e06a5b2f2b1787cc2dd093f3d9dd8a9
SHA5120e7328f3f75d6febefd95b1b155d0d11605b2ee2b5a8de525fdf8f7540561ddccab09f5ccd51b9dcfce47f1d4a3fe6fae99c94794e671119ebb5b2baa63c2845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58022f9a6ca3becc185b5b014c76f6d2d
SHA146dfa8f2c820daf42128e7dfee2a4fd0d4864405
SHA2568a24db1879685c4e1a320cf623da6a5470ca429c1deb966508f664720db81b6f
SHA5125cae02389f34d67f70cc1fb83c668e1d33fbd3642a896237827fb2a0c0bbad111a4ede36814e95a9200dcda2b2521801df1b32d827e3d74d293852512843b754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5452ab28e25d9dd83ff42ea9493cc8e1b
SHA11e3a411537296961bc05c791f4f9f6f07ff391f0
SHA2567a7293bfd78623a62b25f5b07bbf7245b72b64a26b048566f3ea50d76c0122d3
SHA5127411e9313ca79f4c7945e05f2ba2e1987a79c003b63f7700f21d5a26ab01c59b56859544a9f1e90363c0dfb4c8a63849eb5ebabc79c7b03bae30745c898a4ff4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b