Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
41ced797cbfc2564af91aa0f3fe6b265_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
41ced797cbfc2564af91aa0f3fe6b265_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
41ced797cbfc2564af91aa0f3fe6b265_JaffaCakes118.html
-
Size
53KB
-
MD5
41ced797cbfc2564af91aa0f3fe6b265
-
SHA1
4e2db92989f3018f3d51bbbdc4aaa9c0e8021386
-
SHA256
c15bd724fb2365cf45bb8d1f3281db2f870257b73b72ba854bf521ba84c0923d
-
SHA512
84734f75d5bfcfb183aba084784a66118d890c39edf72876e9f9c645087a8ee97aefbbb5052bd4f68122ecf7a9ad75dd3881c79bdd95cb586c470fa199a0f1b9
-
SSDEEP
1536:CkgUiIakTqGivi+PyUhrunlYK63Nj+q5VyvR0w2AzTICbb4ov/t9M/dNwIUTDmDH:CkgUiIakTqGivi+PyUhrunlYK63Nj+qp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000c28f55fa3d05964d334775e6156fb20110af868c16e843876d10f511d1ccd4e4000000000e80000000020000200000009410097dcf4da144a94b377d9ce69df65aab9d316df14638e473ccd2d23f496020000000f75f59f3b512bdbd7299b709fb947c80304a8a6a98ac5642f4bb25228f5b120840000000d1e9c177d2a16b14bd251f164302219bdcb6ae331b35cc192b492ac2d9bbb9f76c6a549111c11d7a950e9f349ebd40b80982b44a9f0b48a70872327ce3f19cb5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 907a732c26d5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427038124" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{572057E1-4119-11EF-B49E-DEC97E11E4FF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 3004 2648 iexplore.exe 30 PID 2648 wrote to memory of 3004 2648 iexplore.exe 30 PID 2648 wrote to memory of 3004 2648 iexplore.exe 30 PID 2648 wrote to memory of 3004 2648 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\41ced797cbfc2564af91aa0f3fe6b265_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584ee5fc8fa4b355a6cc55229e127f870
SHA18edd190bfc3820a770aba2aa77c6ac546b3e1944
SHA256ed7bc449bb2a719ad79693330c6036fff9a7500549621d6d788f95edadcd5dc2
SHA5122df7e6f3df2532ad4b3e080329d2a39f42481ae9531fdddd562eb46dc26bb1ce532a4b856c84b1eafc4d49e3d046a6fbb454eb792549b233fc594cf98b8fc673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e145920f07325dbe40efbea6bc0b36f2
SHA1829a2e48e1713710b238d24b9fbc1177a2ec0179
SHA2560d218c2925a0edeb5f2121c7564ff23866281ea493a34926aebec33d3dc518e0
SHA5125e7f55527949958a168aac601446b0adbd53f3fa2d464812d7cf8b41fe2f02659e9d8bc5d61260971472e56596a548c77f8582bef4a346bfdd67e2f5477bbacf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0640d79bbb7bce94792399c034e63be
SHA1389d9a7d6b33516789e8b0f2e4c90efe70a55c1e
SHA256736e90c33efdfe1c3c307ba383b953b100c48ccad271467a1c02b09c7e9eec31
SHA512b15ff38e23618060006ae1844dde453639e3e9c7a911b1741bc46eca3d29095b686fc6d9586e6b3e0a578bbf786d8c0b8149202ee532742cbb27fc5a34369485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549eb7a14f18df5d9b0e8bdbb9b4118b8
SHA1e2d1be0417b8c5b175ce91756079e4e1cb05e381
SHA25618028e97d51f77c3b070d6497cadc9d667391a10a03fde7cd237adc1f17b3186
SHA512812730087aa3846ede2719aed181e338bee8068495bfa24bb1217fb478d494477d0112b5fafcdb69ed3a9ed422271ea7ad731a7e960ea729709d7b82ac02f036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5527c1545aa40c0e7f07e82fb3adcf745
SHA12bfdea705366222d9723a60972980a3d606311e7
SHA2560b446f7f3a5e9fb1ae262be63c174581b852493166bce7ae6ab4834ed3ddc797
SHA5123655d7ea10174487103400981bcf4176e41ef269ca6f74f744082fea1f16b105e8ec0251cedd03b42fc0a5f4e6a628bac5de6ce9a838dec20c549369a3d3de09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5213bff823909844903a1b6f03b9b22e1
SHA1c51a3eecb06c8477585ce90b7709f07ccccaad48
SHA256a117b9ca1e3c95355b4f1a27194214e7d0888fc6fc8ea4412182114be4bd7e6a
SHA512a161fa02318f5ed4595ab3ac2e55c22c94f6400fdb7c0fd568a77bc055dd5f00664709c2fdc0bc1cc020ea0d16d8de3671a473ac1df8ce1f57ff3bd3935e9117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bfc9ece760360f9cfc30ff3a4a4dc91
SHA1086d09f08527c819bc83351cfae6d6d0564ed45c
SHA25623e022f1ba978f63cd4f5d268a29fa9061178dee73f3495a64eadb156bf4ad07
SHA5129957a2ead94cc3940de2a8a53a1a50000dcf781227f4bfa4934eeb060d6c510b44603cef508b249ead0a76aeb9ded4ffb9e322befddeaaee2daabbd8c2685ac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d41cdd4e93257f08c4129ae50fecaf01
SHA1d08c4d91cfe7111e7dc8a8dead81fef7d80102a2
SHA2565c81412f3d6261acc5591cda1627b6a139ae77b609f4b43ff80c40ab913de9d2
SHA512eefa734ff1dee83bb4f4744f7e63f036816d3e2bc3a4bb279ebb649183bd8d4315c30a1f38505328a52caf0226983e16076f4a16f43fc5972193723271cc7699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae37c896ca55c14596a35908d478b94
SHA188eea368b0085eeaa7c6ad2c0fbb06e088919efd
SHA2567ec7c14676e170130ab00760a2d7f82c6c483cdec1b819a41891bfc129bc1165
SHA512f96ed8efc2a14bd32acb4857108bac23e5134b031b24106ad29571cc018dbe0c8ed1272decd8d07ec7c8083d0da92dc344657870b9a2cc82655da54027645e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7f6cbb035c71786d70804a63631bab7
SHA1e4fee4eef5b15ec09e8e0c534f891354967dfa2a
SHA256612f4612576cace1f2d1c67aa655612af0239ac62f6fd401e965b1c50d6ff76b
SHA5128b973cbb20672175ed3395a53071f6aec8c2d5dc035271544ab2b281f0ee7337ac22a1137ed6f011c74b562ffde1a579abe5e29592ec750f05c29b9dd1f9e00b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580c4dcda64e45c5c83bbd7a5789f9f66
SHA12e286b7f987f9917bd0a7a90db6c23422065d4f0
SHA256ad68ff7a9e730a18094fa7776d76f6fc6a6fd259826cd89089b574e6c3f8fc76
SHA512e83e619e81a4322941eb720647d307e7f50824ab0b72bdd81f39770ab9d1a1f51766b71246ff01be7b9216afb8cc05d2dc206186653cdebba18c914401c42768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b80d22bdde1b4b6eb55589992fea80e
SHA1bd2e0a7f5d77854f6b5b9eea0e2e32ac18e7a356
SHA256730eff0825fd259481fd531a328b3a4a6ec86904f28ec5017a11a77cc3722dd4
SHA51218d366c9586e6f93baf956cc9007bee0df8d3c97b85037ccab03914bc64391421283ef0d72ae029db09d88bf4ac810d534c34881669fa8ef66e49be955d7417c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598c81b5a2af09f5f8b9536c35e942987
SHA10611192cf7c2f058b57b97d1e8c14090dc7fd0d0
SHA256b32f95b303b7f19ed4acb9bee4d7345f90cc7af551a5be7e196285cf1b7923f4
SHA512cb17d73fd588912d891ba727023d817954a4fcbac4e3eed35f301abf6b3529f7afab8cd44271bfea1b9376185ce461e0b718cb36b48941d6717f6928092215d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ca733e8f32307caefbf219d5d848951
SHA1a243a7bfe901847e9dbe67256f58635d13725cb7
SHA256c03e7ce24139875be2e663d79dfc3a66e60a31917dcee7e4eee65e8b96c5cb04
SHA512636665465818073eb637f4019c230d8305f29747a835d849b73c858ec6b1de0bc08f8a52575f7793505b50b2f38c29bdb013a7ebb3367c42fb61888c5fc548ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503264b7c247e37532639b4d78e28026c
SHA16502625d33943104031094ab7e23bd18c74d15d3
SHA25620716e1454259fd27214ad423505bba09277e9a126025a9c1d5acdb06f62d01a
SHA5124a45b392e873eda308dc2f0bd0fc30c314fffd05ccca85b2058fc28dc5ad75df7e4d75cba438bc327891ebd30bb2674ac3c0337ce3f47b86d1a6b805c9599b39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5975827447bc6c3c1a0add6cb94a810ba
SHA1f227f856e05804a1cdf8ced4a98a9dc6f26cdc8f
SHA2566b7a1aa4e746bfcc7b400967fb26f58c159ce03ca912a6537c65af4b8639d211
SHA512208f236ec441d0a2ee260d2ccbbd10a7c408eaafcf543a24bfff10f8eacca42217c0f1ab8ba9dbbbbac34b8e8badf0de49b6ef992d0a6d19a8df3f3bd98a9ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57383f84270b8f139e0ca8e8dae79a3a4
SHA1f45d4c2e5f8c124d0d3038d4b05baf0d0de076e9
SHA256917b7e8ae5623c16edfd8b833eef4ae4dce86d61d2d69694089816620fffd7c4
SHA512409db7411fca7f7d974e005f214fb04a606f41339a78feb34ee4f4d0a55bf25ad8e1817d9481f5da2e36e8df175bf9b55597c0be3d427922165ca687060a1256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555cde36420855652d6e648d619acadb6
SHA1e8027d8a86cbad6fedef09647b5e6ab8d7dd2897
SHA256ff3e415b7c52c242657cee3607c26058101cd521764d87e210721e70ba8989e6
SHA512b2173283ff9f83941fe8bcec22d9b7d9dad8ce3881213f35e8da80ad32c41d4fe23046147a943945a72a103fc1bd48ed5b4531f1826adc16b9ca9d6c0a9b9a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5477831e53fbb263365deca4278d305da
SHA192fd238bbb3514e2c87282ced6231062ee84f543
SHA256edd769c8b07c9ff615dcc9ed65b96a85fc26c7a58bd2c9af7d1fe1ad1adce431
SHA51230d5694b33d55be35a4a79b3129179ee7427a0a4ada790453ae950c805c8bc31c62e3f6832c64566edda586d57c0ad411811e5037047be82d30c1d0a8c860a24
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HTBGGANG\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b