Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
42796fbfb3970620b887fd4aaca12110_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
42796fbfb3970620b887fd4aaca12110_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
42796fbfb3970620b887fd4aaca12110_JaffaCakes118.html
-
Size
53KB
-
MD5
42796fbfb3970620b887fd4aaca12110
-
SHA1
463b73950fc6fe12b4c29e07972cdfb403d7c35b
-
SHA256
ca701ecf98c0f5d1423c780fac74884c9dbec96cf4d30804ceed978457767d13
-
SHA512
493994675e856190f4512264e23c6030e58560efdc1af486755416f057426cb2f3068ee7a3fee60f90ddb7cb49ad0c41d290611751f05ca96944fad5c4ea2bd8
-
SSDEEP
1536:CkgUiIakTqGivi+PyUOrunlYy63Nj+q5VyvR0w2AzTICbbQof/t9M/dNwIUEDmDM:CkgUiIakTqGivi+PyUOrunlYy63Nj+qz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000a732a6694fdf94033e657d930927e2a29292b568b0184703e340e5c7144afff3000000000e8000000002000020000000b3f2e4cf25d499dc3c40773733dc61dbb7dfd07897b43f0e599740be0b82b06120000000dcfafd22342409ca5e6b062347ae2dcb60aae55a7c8ffebebe4b83021afc9504400000006a68183d07b3b93a553616397bb116c05f3f64d735f64e45bcc3886d04833a1b1600bcddfbfcc69ec26c50c5cba9457c3692b48b0d934ad05562fad335122886 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9FDD4F81-4135-11EF-873B-E28DDE128E91} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427050272" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c029be7742d5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1276 2300 iexplore.exe 29 PID 2300 wrote to memory of 1276 2300 iexplore.exe 29 PID 2300 wrote to memory of 1276 2300 iexplore.exe 29 PID 2300 wrote to memory of 1276 2300 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42796fbfb3970620b887fd4aaca12110_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2c8d3b4176946b7ef6071bf7d8dbfad
SHA1c06cd79e2c888da047c2a13fb4488287da98a8c4
SHA2566f72d98bf250c411ce60ed485687b22ed06f61a616b0d5166c7b6f3644510276
SHA5128a67a6663eafe54899f49545b35e11aeb9f96b3840ec16e9291a5ba5ee15a9a6f7c5f0b2476798da6f0d4247b9bf7aaa8ccd6adbdd8f9324e0601614ec61a119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57414dadcc1ab938a23efa0ec7bd8db01
SHA1deef457f428265815cf7697c3269deb74ed01802
SHA25685d1cbfb4773e224bc2523a98b9715e2ef6370e2f333138d33765d7b7ea59a90
SHA512a92b871ea29b918c94eb054a711a908f9d69aaf6cf0acfaf1687701c74c71f6a6ac2fb42d0714dc8b30ccdc99f42506b52d9e1f36a127277a66729c49917f6b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d66d073bd23de491f0d90226abca823e
SHA1be5b2fc1331e1300e111b83498a3876baeff7338
SHA256adda9936b43521217760a5f431bbc449ecf5558d5c91a598508c7a88fe7fb860
SHA512942dcea6852336ba3b84c4289309b5412e8b0c44cc240fb54fba7c51dd0465aca0377abd9ac006dd8868760b40a9c9ad010dd8eb67269999da16b475b99e1c1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56386c11bf39ae876944a33b44e32050a
SHA18bf2d43cb2be7b4944d7e03f4f8d84f05d91b08d
SHA25616daa0d5c05325291ccc6da2e2d000538e80ee96acbc996de4eef861a9fee8d0
SHA512c36f8bec3776453b51b1e7b2edd6ab258cedbeaa2d01fe3c25926baf78d2132f1c3df39c4e975e3a49a435a9bd3a9f7e8b198414732f6bc283336ca0032a869d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c3ce221f0d0d1edc890ecbb7f1c3fff
SHA1f2d4e1dfd18b469477b041b69124e38eaf1d0349
SHA256fb70c784e3a94b549b4716298a7698963b02152becbfafb141124df752fcf92b
SHA5121390288c77797a2eeaa226a0b6ad326f68a6841d85496a7aafa121b5d38ed2248c6dc93df3416dfcd688c2559358e16c6631886b7f125a723420785ecf30c0fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acf01bf6a1e99c9f371ec48009672fc7
SHA1fc3d5e17cb5181ae46c95ec3d6578ada6747ed6b
SHA256168b89c41a3a4205f7960ccd129006339e51ec37630978059e71edd8896fafd9
SHA512a275c65de07c550eeff8eeab8309b6e603681697b72be61db4c1a4304d3a1add64b8933e9b8bf3da18d35051485943de42774778d7309328500db43a73ad6fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535efb6636b38cdfa3ada6fed5d97b9ad
SHA1182d8a29b09a281d22fc456f14fb156e0f5cdc7c
SHA2564302ba9ae7426a9e7d6679b6671e791edf0a57ec23027a2ebf3dc4ee58fa9a45
SHA5120b2c693305ec196088561afcae41f761c8e7be1ea261fa42a2439a0e1f571eb1f7c0b70a517bc8057f5bce87a16050466821ca5ef94ed347ae342e057be88b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af40fedaf524b93842cbe1539dc88885
SHA1b29df81f1a6696ec2bebceef9f10bce6c9bf337d
SHA256460ef5244fd87603501bac9dceaf2ee93372cbd2ef6d3c0471ff9cd720a2b3e6
SHA5122bd609fc67a997c362c3ecd232b0c412bb7be4c9b4ada36389f58eb3db74cce19c7af3ec6213a8715b851d4bfc2e948137252324631971631b023e188ca92fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5195f758a8fea520a23b451ead2aecb8d
SHA16da23dec7e3445b41d6cfbc6260dbb400d04f5f5
SHA2560ec5b247df033444db5c0b0ab2cc7ec9a43312bbc1e21bded36d60d9a34bed61
SHA512db0500195aec6779d270da02ab728dedef518de4f1ff18aa0ab54855edc4e25af73499dc9d8339637c24a3001c33c62423a744a0d7c01cb88a3125c75e3f164d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512ded815ad891dda48d7838c1ae98bde
SHA1cd7d922671bc72a1bdbb219ee813a88e3d070294
SHA256403161a51c97e892b8e4b253689c5874ebb2da88c02a6829d9b6cb37b1c381c7
SHA5121eb5e4246e63f5ef7d68d8946d568b79fbae97433d3593a6f609eefdc8a8cb72f8512a09e4f606fba253754190004052a566afc8608a58744c0c99bfc7fd195d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544f947d16405aefc7629beb2bc3f4d70
SHA1698309ee9b390ea65028bfc1ae4aed98d54991b2
SHA25683c873be6e170e6a0478ce471e163b739d20e9cbde2851be14225e0cd748de4f
SHA51288f730ee11865b97c7f6c5478469c79dbc2a5add89a5785b55fc6407dcac6073e534c37225a4a0d9d482f235847bb03360ab2084cbaaa192b4efef8f84838dd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50af37b37c65e4761df2bc12ccbf8334a
SHA1e5a07def0655315fd4500183415babad22e79fe9
SHA256ce954088b9cfc665dcf976f858d0e6f68bb817595e0a6f5adb48ec27c7933be1
SHA51221d9f7024ba7ca542c9cb570c3b0d1fb81a76c14db24bafccc3ee8c25a7052dd3a6ada0f1fa1fc81482c8c342eafa936736c2d800f7f88f89abae89ce337d04e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f15315a34e16f1544aa7c006b366865
SHA11e233ca7cbd4a9b9288633c8ee2a8319e933a5a9
SHA25687ad23f4ab29c5e40b92b81608263ff8e05f3021fafe5bbaa2bf65cd3ac1cef6
SHA51230732f7c8367d40a8087c94769bd25e06f19f65cc24dfbe171cd399a66dbc0b0c7650fbe88d9fb50b8e4c7170b94400c7e1afb9b1c534b4ba90bffdcd98f79f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51029676a3dffdaf5002471f6dbe247c4
SHA165193bf0f13bbf0c5a5a6354cba01c357f0eab53
SHA25640f747d0c5d5c96d7ef29d63c55efc2cb28f012435a1bb2635d73413892100cc
SHA512dd16f3b54ca13bcf5fe12a0f03cea17d67273b618f9388369f504850c504e58018b879142e998a56e4690328c6faab245273cdc8e503f27c0137757aec6796cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f1729d94fa11fd7b592975d0e3bba14
SHA1390be39de9ff454513fc58e92ff13db5d3135750
SHA2568f2f18d0628681c5686b712cb9f61871c3ee960b58b38f07cbe2d6708a1116da
SHA512698f466176e611c57aef58e02359772a9504f4aedf8bcde418f82135607cb92f3f4dcab8c095fed034b1eb1fe7176e1edf4fbeef6ce11c645f1a3f91cfdc5a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560d87fdcfdbcfa6a62544286428341f6
SHA18f2ac80747abb58822a2c8080f683386460ad5d1
SHA2562ce161f3e5a3d177d3feb7f4179daf6c07cb5277d9110c704781286e1cfde795
SHA51288f077ce07669c48f2a5c2cd4ebce93f2982d5cdc01e43a50e502b06a64458ab27008c494414bc0edc76718cf378f6f8f90304e1c704bde602000cfbfded2450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57772592b19f3dbda6782fa0f9c87ffec
SHA1e4deb4724e7852b109ed33a669cf7c51bfd621d5
SHA256d15f91ff67e21262c4d4a74d3c7b1f673c29e58768d60dcb3a228e5423563c26
SHA512a372259eb9346acd5402899cf1c742a2631e7e36f58c85ce9254973dcf3ded529cf53f58ca77098d18987872424cbd811eef66d25533fafd2e9c4d1cdd94062b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e794cb8c2fbdfc12dd0cc540f3841b07
SHA1850473f95dd132d9c093fba1b7e261c878644172
SHA256e2c43d1704a8b5e96d63be92d74d38f14d9b821a90950bfce7d793fcf25f4a0b
SHA512b2b6713cc0b38e7c8f58ce85be947e26c4f4adbef26f987ddaaaa87e526dd9b8749cb84ef8e613905573668b87a2346e099e69a58207c9a119424e78456ecb0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5180aec595fda78bb52dc4036932e981a
SHA1fb5226855e3771be2efd81f89d28c73074ec6292
SHA256e28fb1f285f67452685c54bce1eacd163b1bf61abea0346baff46e990b04af3b
SHA5120284db69deb35cc7507b4239d2d6ddc7ff5f892a97198856eb5cd753f0b5cce7261cc0f908ffe17361ade63bc52b9b7d36a4e37daec5be17073be3422af35586
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b