Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
414c710c6f6b744a789560934575c71b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
414c710c6f6b744a789560934575c71b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
414c710c6f6b744a789560934575c71b_JaffaCakes118.html
-
Size
27KB
-
MD5
414c710c6f6b744a789560934575c71b
-
SHA1
8a307a05d58586fd17b57cb6683f0bbe0e769926
-
SHA256
177f82cfd033f062e9e039c8de0d66f2414323c7b4ea32b91833bfc32092b04f
-
SHA512
5c1d7dad6232d8391c76bb57b25eeb49ef035c38ca584109eb949a77090cfc5d1729b5062511b13e32252b3c74c3e5aee46997b76bf4a4b09113c9e51cfbb055
-
SSDEEP
384:p6GfcX/vLV7D4eyf9STDyIBiOHBFp0MMbopGpnn7rcNGNZzpni1pM7fGpnIpu7KV:oguDV7D4fSyIBiOHBINR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000016c14e46b06c402f19decce6fc953e888260455d07b651e691791329c391daaa000000000e8000000002000020000000f8a15a55f68e11df00fba96755ef4935e76d7075eedb928605423782a64a16ac200000002bf5744d3fa5abc1cce4ed3f784be987709749dddb6960a5edf539a7699cd4f3400000000e9c83b4713a7e97b94a29e6a905414ac5ef5b077cd190cb0d578a9258eebbfd58cdd6e15c76ddc7f543f51dff0154673a31ec9154a6fd4a8524388d8aefa6df iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C7032B1-4102-11EF-8BF0-428107983482} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427028335" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60dcf1600fd5da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1864 iexplore.exe 1864 iexplore.exe 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2076 1864 iexplore.exe 30 PID 1864 wrote to memory of 2076 1864 iexplore.exe 30 PID 1864 wrote to memory of 2076 1864 iexplore.exe 30 PID 1864 wrote to memory of 2076 1864 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\414c710c6f6b744a789560934575c71b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f14b81b59550991bce47291862fbdcc
SHA19c3a712298c30925719c5d7f5392e5ec7962fc5a
SHA2564736d837fad8926e767621c89b17027576ee8b04d9d0255fbf5b6c177d87a400
SHA512ddaae66f31655bbb9ed7467f7597f52710ab21b86f1a45702d0d7eabb2ee484dcc9e135b1f6c1f2e86071c4232a10f992376bb554c3fd7017c6f2aa913edab8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edd8c3e5df01ab639ce76d886aebbc9b
SHA1c97d055134c0d2c6400c1b32225847919e844d35
SHA25610cb74c70ad831a4a3dff2f02a5f8b7a0dd2d0322e306f0d5a278dc07d3b82a4
SHA51246b0643c8ff033dee701b8014990e1b015d0ce3a9eec99237140f27c1abfa5a9b81491989b2ca847d9522053c8f6180e7cef6b36c98a9e7c4f09f476b34f560f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e680ff8d6afe3a481f11b79292fa8bc
SHA1d8474e3bb28beb7142b7315768ef9d9ddda88d63
SHA256ac1ed893a1a6bfc827850d6036be9c580554f1fb920b8c339d367562b68a0a77
SHA512671311b3f9058c07aee9b03a0be8befdbbb539e61bd075bd7b0ab96798493c7b9d8dcc82b113aba11459d9af385f7eeee792e12affb167f11db5ba4174b63508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51670233d9f199a4183863dbd8028373d
SHA1a00abe9ffb5c3d9425efaf3b2c494b4879a6f192
SHA25657e8dad98f2b1eb4ca5fdaee41cb8b9252d2b045bd4dd72550a59358e3036608
SHA512cc61c5cf584b6f87ae534104c48c0e433d9687c0d8c51b3639917e3aa532259ba779114c2d6f0be81829765ab49487e2a88aba6e13e0b505a535e06dc89f8c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5612fcc29cf1bf4489667c5f8f92eef9f
SHA17b9d6f48ef8faf4e80651f22baf0569d1f82b052
SHA25602d014293be9850206e5e20f0f0e8002a6c6b7d0dc5a3fdc3410869cb81cd7fb
SHA512e94565db409d14eb8bd48246d68dd0321995a83596235754714bbe0e7f52a2650c1d29147009b4ffb87c8b063098e19b1727cd197b1e8fd7aa464153d357acce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2f61b82927bbcce0c682dab4133d651
SHA15c346123e8ad8e9bd9a53951cc80768c054b09e4
SHA256d4cf3b7c8336476119546897dc0bb34d33399d9d0439f61ea2cff77d169e66aa
SHA51244646718d9418ef730198aba124bc7519835b485cc13689965a19e76142ff35c6e8bba0699fa69d6d14bd29acd459e66643caa1593307f6fe59ccca18fd91e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e716a5b3a423ed5835018caa11b9e93
SHA195995e1b2bf7cb34fbc3cc1743df92b46cec6422
SHA25626a61710540414e3ed7baaf016bf38b364c1541bcf31804628e58afab09a2233
SHA512915d6274ae3c802c790d9d87cc5fe9fa52cc327566184b944db4d4e26a29738a9a427b84b60504a34be40cd3afad3ee550051700c5db3c2be1ee4e1c13ddf86f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea3e86ad4d4a32e3cc053b1425336987
SHA11aca806cf3aa9fa94ab701c7fe104e89b1920a88
SHA25602644c3d4556470df57acb1bf4ca9425c8f069ad87fb5ab62b3637303be95a92
SHA5126772ab13a3aff4041d061cb5552aaca25bef5807dc02bf59e8bc74bfd6cd33aa3911a084f5acf7632eb208a1907ac6407f6d071555857532c3abd9d472fe25aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ac3cb7d819710672885e8e2669a5c47
SHA1261152662178a4670f67f9e8a8ef14ce229de0cb
SHA256538a5c38a0eac6f026004eb80f2f12a33e80a5ef3d5ae327881ed753d719aac5
SHA512e07e7542e3d3f06d552bcb24cf91427a26fb28f49444da2badd266af82d4f2de3c3981d5267fad7dbd13c2b6f4d97f691264a61d426ebcf1f2fb7a3081555e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558bdce22d6d005bcfab462c996c8fe34
SHA161696121cacd035b158454283e79dc4e1364fbcb
SHA256552cea77277ad66332b62d9736c998c3c9890d33e53ed963bfb336f56eea846b
SHA51249caa102f2de2f25d1da4532c90f24ddbfe4bac0b35ecdb9eff1a290e6858cb52ddafd5d24efd49089ca28b153acaf80c35d1f75dabfd182d558ad00d6fed468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfe0031aad2725a74400d0e21407e884
SHA142e23a49300789b32d566f42b35353546be9ccfa
SHA256824f7427c840d9ee4641cb91b0a9b5ed4c7536930da2ee3264e323f734c263c3
SHA512fa768a7493e04bf8a48687f088ad81277bb89d347339245e84fe7c5e2103743c901fd3371c456565c212dd357b05239e655c19e838d99a317383994f7abad708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5579591b503cbce4a2da86e5c76952305
SHA1aa4d94ba18c2a7e3757c894b89be4fa5d90c04c5
SHA2564fe2458fbe667ff39e809be117b162a4378fee013b1cd63ce0f88ae64431c61c
SHA512df0de8b18db71f61b322a4ad872f31ceb8e1ee71c33b4a723dc32d12a468dc1474b81174df1b874026b482f1d9b2d3134c1286389e85f33782c6aaac0d12e682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52468fdf86b9d5557f82a2c1fdc26faed
SHA13839c7983c61ae612230c60ccd4ebfb33d86da5c
SHA25625ebe231dad48c983108f8711c3275bc51c8ef890c375ff35066cf44f8564f66
SHA512d8a5f37d759b658590436847d66115be9450cb84f13f9e28061e91efdfc7d180c1cd1438bcc740b5330533f02f8270a1f3618da85e31ced61ac3bb5f536fa8cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e08c37359e55590f37ea1521c403c982
SHA1f0c1639908a78613e3cc2c9e9422e82c4941cc26
SHA2568e1336dcb583ac426d5d21307c177c5f5fcf1c61dfe63ec09d2c3fb667ff19ee
SHA512915fc6df52b9e1af190c8b4f1622ee0bc5146d0f44ee6e301c0035bc2319653c9de4e6e79213a4593527369a40f33143aa328154ee4c2d70ae2d544437dceec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdbe96a0ff8d30e2cb32f41d172edd52
SHA19384360c1eff376ac10b528b69f52ecc226cf645
SHA256653964e85e3ebcf68c5b279fe9cfcfd73164ed02cb49aec8a0aff24d77152482
SHA5125f676ed4ebeb13548397bf62fa829e4d6b2f10719fd9f0aaf2b7d5f3e2197e435280d8e14ec32db4417a6f3ce905a7c62200dae04c34db2e4d0ef69d1831ed20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561eafe98cf28dfc7f256060457439c0d
SHA19b7ef0fe1de6105f415d8e7da38af55eb4d65d39
SHA256fd508c9597a89be2026e905ba19b4787c54e5a8ff6784a19384099a31914d958
SHA512b550beb01c72adee20ae3e6025c5c520d7d68aa07ff1e80d8468f3f2946e2cb8635a903acfd900322bcc1713a89c36e4fca02fe089732282e06aacf48147ed9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0b0e160704739ee84e1c45bb8e2c177
SHA1f4967a566e49044f56a046b4480885e89dbf35c0
SHA2566a4c36ea37003a933bcd0f18d4e85abfd55d3937f2ebb193fa47fc917aa8aece
SHA5122b0951be0c6bb1d2d6c14672f1f153ed3ff413bfe4fb009002aacf11a4fe05c676126caca67129dd64d13cdd4c0680ee8c5a8d7b1b070c43b6972fdcbecc21bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5177467ddb30761051b45c6380cde56b1
SHA151decbe8e13cf861839f7e6fc90de4a75f22e9f4
SHA25654c0f9efad81725ab505572c9aeab0394f1dbae8cef8baa1231cbc054f42588f
SHA51210ec68d85d7ca99ec8e0a9d804be93eed5655ad72ead1d89a83e3d3658b94e8ce9d6d884ede0ad3274bcc8dd4673c10bee625c9ed5e4c5b6c40b993052422316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5901c8264acb95425a70bc5e820545f2a
SHA1cfcb6055d8788aca5f801cce396f2799dd150510
SHA256b67963f4c5db632e8bc9366204bad90e305b19b1045a79bb370c29798c368a35
SHA512f97fa3ac61e494a8c15a7681bfc0cc6f6c2bff31c8a5a6d9d9b8316043e474f2dab6c0695876fa021211d0d929cb78ab7ab929a422cb0e1de477c897f8c2bb6e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b