Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 11:55
Static task
static1
Behavioral task
behavioral1
Sample
418eb71b6a98ce4b83685b62938246b9_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
418eb71b6a98ce4b83685b62938246b9_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
418eb71b6a98ce4b83685b62938246b9_JaffaCakes118.html
-
Size
11KB
-
MD5
418eb71b6a98ce4b83685b62938246b9
-
SHA1
646b087682ea62cd2b9ce1e22c4eb792c9f2b2f3
-
SHA256
2cfe353e4b46d064517b4ca3182b515f6585cf5f8be76cf182098a7cf05b169e
-
SHA512
994391944915cba902a493094b6f362d8aae7185070435a2c33779adc722957192841dd2c217801d071c14a14fb0c64263355545b7076bc0949de91f9cdc3b0d
-
SSDEEP
192:2ValIsr0r57MkxHT8U/w1whqJkR1y5uBuLbdU8d:salIcIQkxD/gGy5guLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000cab154ed2ae1348724973722084a811fd3605c9e9a31b52b1172c7a86566d8b1000000000e80000000020000200000001e0c11886dbb794014a2a0856f2195ebf2e1571804c73b0b2470f62666ecf3622000000060f2958fd39c78321a0d5a87e602bd93836cb58aa36b1bed9b6c0d7abef60e8e400000008236dc045080afd0bab719da03d08c9728352ef12844af5a5072362b2be5140520b6a9295732506fc7bca8ca988ad23be353cf30c5cd63536b6284fadb0d9778 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5020aae01bd5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427033621" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB1BB361-410E-11EF-A1A6-7AEB201C29E3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2772 iexplore.exe 2772 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2688 2772 iexplore.exe 30 PID 2772 wrote to memory of 2688 2772 iexplore.exe 30 PID 2772 wrote to memory of 2688 2772 iexplore.exe 30 PID 2772 wrote to memory of 2688 2772 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\418eb71b6a98ce4b83685b62938246b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543449c59f9093bd47c41f3fddb849631
SHA1b0b6abf1de7f6ca595ffbc0cb9993021fb3e1080
SHA2565b41b60f2d653e784af3261b940c61a1a8bfc33acb63c5c0e5751f05c13f2f58
SHA5128306e1af33f3c04f13ac905e7b90eb02b46243ff541b6f6621b3834bae2625979ba84201720e90d284cd831c54e766b3421ee21c175747a3545f5f611f7e34cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be414595e9b8a1981386ee679b34654e
SHA176db3ecdf3e1ec51449db31a0ae8cc5aa18d5271
SHA2566ad8b2872acbfc754af57e350020a575b559c51fd30c3bbd63e50b85a668530d
SHA5125c99b397f260e8d79e9d32e782712df28c238400f319ca2ac554ff42077c23a013443015673da0ab5d1defa282c4142c7d4b3aa1f4f3275dd006684207e6c5c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6aecbb194c29ca7e55994984664f428
SHA1eb21bf2699492113fc118bec886c895b144db7a7
SHA2567bfce035d6f339ba369ba8823678dbfa1f86d9585246ffd19c9f31c9c13d8c23
SHA5125caa8dd585933da2632674968e0d1a9c5a0181d27d8a636642555a424b303bb3abfbccd03689fd918ddedf97db1c13b7d78af003dd7323bef114ba95ee61d36e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587ef3a00a51802481563603f1d662581
SHA11752f96131193576115593e2903b83c219b533ff
SHA25652b4a673d99d199d24cae68fc5dd5583d1479a62104c52e57a0793752b9ac8c8
SHA5125f3d436b9987ad03e7349d58fd4fe3867c0862c6706d7f82043ae667a8220d783aa5f3564202f9f85cbc3c08b4fe73c6ff6ddcdb46f203269a52d1b7026ccb1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ff222f939e5d5c1636d57cd27f86716
SHA117a7893d9c216b5b416201b4ace017ecd968a88a
SHA256d4e28e76bdcd698c649ff8184b2747019ebb3676dc9c047eb1d7c0420ac23c2a
SHA512409d3f3b048a3482d7f8d7e3b094e8c27d998e642df747e972b1b296379fa35902bd32944508383d000399fb7ff6155f1798e4167a5a676a3909392569b52fd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564ef42d1a17a3fc28985a19f0e3c7d3e
SHA15cebe82db36371796e100fd424711aa242932557
SHA256a9ef407aeaee2a68de0036752ef16573181c23acb2eb77bdcc9534ab8df5840c
SHA512add2512f64acd197505a4cf94ffcf90400fdebe51b9421eef852f0663303fad29def83afbff244aab001b619cc44e1bb886665e9d5ba13ee3dd9510c189d6af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54271dd9ade1e4dd9917fc5253dbcf688
SHA1974d41e0c798d2a5e985a11892430562ba290eb0
SHA2566752a2b8c45fd197903651cec0d45ef7d021cf7533d2bcef9235bdfc26d0dbc5
SHA5123110473767bc77c92ab418aba3f3496c7817d5b9dd684078e86f2a6629cf45f4b0a98d5aa7940dd909ee2d17fd5e2e1f93738b009bdf63fadc05b2cbc3e3901a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa76775c26c5b1e6a78091e52402ac36
SHA1a703ab1a7ed765c309f8c87f894a6c9d3c6b9cb4
SHA256a2a402cb724371bc633a4bba891b86f6356629d5758878ddc95d541431edad53
SHA5126642c9eb402464190513429b7f9e5d3020822dadcb35aa203e89759ed086f9f423c70c32c0a0ff00c3cf242d622ba46cf3506cacfb5df0da5925645d3b5a3440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae305332425ccd5e02bf2ce63405666a
SHA1901b9bc26b4ef6244cf6cf6f2ceaa57ae27a97f2
SHA25612889472d6e6f1276220be63b56e5b18fda6dacdb77954d0506698d95c052970
SHA51244008c1058d2885c31eef914859dc39e7bb9cc50af5376e66a1430431e09b25847b4285285c6416e821a8f2a2e14d76ea9f58352718643f6399ec71496743c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2ef80e71b2ae17cd365ebf64ad24b4b
SHA1dbb081aa879bff81e086b05d40cbbe84d0c73f38
SHA256e7ff99c6bbfca67778678954d50318a233cf13ec16086fb37c1b0a2f41973535
SHA5129441b11ef26d872690a7dbb8be982d8420deaf2a58993b2e2f6efcd20fea0b5c19e3eaf74b8327857566613098130ad5f9966c8cdf342c8ae9494612e0841eba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e678ca658308592f88e0f4f2905e127d
SHA17c54aa66ff7589cad58544bbf3d154249ad5cb46
SHA2563f5cd80efafb08a48463fe7cbfbdffcfea0c69344ab870a66b46a8ea0de4f5ac
SHA51207a4890fdb8fd332e3226f6be175a6631d94f882a7a6f67cb4bdadcef5b6f0bc7e660d4a01499cbe5edccb9e96ad1d6e99617ee3f751292ee6d6bcb26e4a31af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54edb8057715f7b6a7897fdc93d966a99
SHA132148bb851acaf6760588017b9f933c660140a48
SHA2566c865fc3d8ed537d7a3cedacc8ae6259ad08e2dd2b844327ad310e006b71598e
SHA512eb81ec9e0b3e06f42f0f40125f209c0aae827a1157322d73df24e7b8e231e580b4dbfb457bee4d5c2fdb0dba70e5a090bd9f9a6d7d1be0492c383785b0d84d93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5375c856de5af7d032289bf1c3f0d56be
SHA104d17d77ca4b36123f8a6dcd1022ad3e2d6d817b
SHA2568bd10297f9159860cb00081a40d14a37c24c5f63f9e60f71d2057556535bbbd0
SHA512dd4222d1f6436ec2683b3d04e46c86165e3b86349e2806b5c5733af970b937bb9754153fbdcbeaa3274201a1269609e6c028eb5c0b7dc2cbc93445e5d6a6075c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c9bbdf9f9cb4b836e5b6889f61ab43c
SHA1bde19e14d016af45c799a0373abe0b14aaff9a4f
SHA256c9bfa43494fe4314f8308ed0d20ac72ad4627ccf3296a233427ed0325a848609
SHA512d0aacd99dc85e882522fb819ea1e47c1330fb83a10b5768cbcd0b408ad8f031e07c1ef138a89512b84854c943897e933249af64b39529cd4aa5bce9d2ee31e90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab3e90c7849b4ebfc8069ef0a2f42e48
SHA105eb377b0e72b904797c4266ed6fbca8246cbd50
SHA2569914d621735c50e1d295da913c7263c93f70d6e42cedc2b32a6492c3a9b3373a
SHA5125689355e3a2cde9ec26f69bedad1bb0629447c44cc5a2b8518af8ba037d37d7ae1ab3be37eaf0e3c91785df72a3296be69c7c83450d9a589da25a0d2f032ff86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3e0c9bf5bca28f404ad1be3cbcb0805
SHA14d557ceec2f39815f0337fb7573ac36f9bf67cb5
SHA2565a1d29a33fb346f1326a4137817093af380b0a9ffae90340e46f19fa9c926c7d
SHA5129f1c271fbdfb68e73fd266c8672e328cbcdc47c241f0d4eac756f2eb568c80dc33e770ab1f8afc319be22fe3b6412e32889cc73f53c659768b9b343a079f1d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ed8dbff50a660a8b1e938a2d59c94d1
SHA1307b8fe22e9097e02c6ed1bef3dc63332baf98f1
SHA2567206f30559a6ab420f3d160725c8ba6ce41ebd8b30cdfd0b542596d8976e9ed3
SHA512cc9a651486416b0fd2190c08aa48d2c0dac831911bf50b32507bac02a0133d04fe56f27876e337a990a221d7b3c5263b33a437a80eb7a5d53b929e202c1f823e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543532ae800426034768a311490797f6
SHA17f186bba26fd6e1766c8a65443e713476c13f4a0
SHA256989fce4a530dba50998541cf671eeadc8d08163450af7e2b4f03f0b28881f81b
SHA51239f77464b6c39eddd2ac18ca6af198e69489c9507c90a1060e05aa2c1804dfd13ccd06c2300a3cfe3fe8a538857bffdf0f4035a8f2a6f9778918670d36f47bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c946a425c26e930d00528b70b7739f31
SHA104df696a8b82693b24c0c2eeb8c84f7af46a01f0
SHA25656e0c0e84a0a44ebd57cb3d6e24459745e294356404587a9f04200ff95dd33ba
SHA512f619bdeaca69762a95c6be81adcc7a647306aecf9b328756e03f75a58c4e65863c5baf7e77b8bd7fbd849fe70de436be6ab183ffdb40d2d45804ca7f6a2ee2b9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b