Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
46461072c7a736496efdb6fb4bfcda82_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
46461072c7a736496efdb6fb4bfcda82_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
46461072c7a736496efdb6fb4bfcda82_JaffaCakes118.html
-
Size
21KB
-
MD5
46461072c7a736496efdb6fb4bfcda82
-
SHA1
7b67a8c61a645248551faf90ba1615cb633c9ea4
-
SHA256
8d928ef2df7e45395941c8e06ff01661daedc3cd149881c8d53d070e2dd3e4af
-
SHA512
3d8a3ca3416a9e2a523384e51f4181c141391634933186e1e2fa883ca9309705fa701bfee9d81151a32e8a54d57babc24ad705af8128b6fbcad905f0e8af26dc
-
SSDEEP
384:CsF/hv8IxTNGYlkASK1KNe9K+KE8K8sKcKcKlKNe9K5Q1TGP+2:CsF18IxTNGYlk5K1K89K+KnK8sKcKcK2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC4A93C1-41EF-11EF-A7C8-6EB28AAB65BF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 004c8a93fcd5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000006e165f7acc49b4142019f41f98beeb44ae454f8709e6c74fd13abe221ba422ec000000000e8000000002000020000000f8a939c5e73b5a4fe3231d1089f61b35aa3de36f7ca0ce5da26d43ed1f35a3502000000053bdc0597b3212ac0a71f9436dab925ffcb45019e53f29924b330e26322bc2aa40000000c38f3fdd125096d61da5ee1e8d1656d1ee0f59f8b568334e565cd24c92ed026f263d3847026d12febb6892f9abdd2dc39ddb124db6b2ffafca33a5ad05f4527f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427130206" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2400 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1452 iexplore.exe 1452 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1452 wrote to memory of 2400 1452 iexplore.exe 30 PID 1452 wrote to memory of 2400 1452 iexplore.exe 30 PID 1452 wrote to memory of 2400 1452 iexplore.exe 30 PID 1452 wrote to memory of 2400 1452 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\46461072c7a736496efdb6fb4bfcda82_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1452 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5603e963cafb6f35f13dd8b24eaaf3ebe
SHA187b51ac2d529c82e4a31aadf0332002cc5e1de8d
SHA256beb8f6555993e0beb1453ce0bc62c7b412cacadce2bfbdc1194b903ce443a540
SHA51211e9ec6d26deae1cd2e9ee791a4f7d734d6eaff3eeb06090dd3f6d757f31e7927667277b511572ef62eb37f083618e52aa178153557d1e256400828c6417f9f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595830eb131ecc9293e46b40c487560d1
SHA18033a4d39879ad829e012615a3ac00f37fc1016e
SHA256edd784c679d04edc69d96b1b99d56fa69e133d353a260ccb766fb444d12c58cb
SHA51215ad0dbdb9a325e06c66fdb083143287b12c454f14c7db2e7532e0209f3db352fcd32978ef0449dee74df4e291a8c4216e2e1427dfc050e9c4dcc1e4a105cc93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538876521047df8b7b3d1f92fc4a49896
SHA175ac6f83889af73294faa3e94a6f5dd78a24c864
SHA2562c14c0de4429351c37a3c5203e1e122e8b84ed60dfb4fa12e18f34730dec237d
SHA512e91fc398d6ecf7456a032c6377763ae613ecc753eac3fefbe90db35cbab6684e7326fcbdc94e41dea77e6f88955d265ab47a6dcd6250bcd8e86b3ae4cd05b948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c863b258b78b5df0465574342aa6be81
SHA13953be6f9747a37522af357a00c528226e33637f
SHA2568e6e8fdb4252a448d368069ad12d9e9d9c3255db3939a4f6924dbada9ed1e7d5
SHA5123aa1a00b47ef9a935e478372ef1dd088da9e307620d94d77023c7d8c8905091101fa32890332fc4be926ca7a7bd308a62b34cd0c6ffeb57b65ded82a256aaa66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8701a1bd792f05f640218fdba84f949
SHA1f066d35b88e7f6718670dad4c7539b951d2a41e0
SHA2567a1a4df7f0dceb7e4c4b2a4e9554d086065e7d1757146956b79366845d4ce6f6
SHA5128d7f4e25201dc7e07a70778a635b4f567fcebf61134d414f46753a977b5b4f9ddf4616798f86c3b4aadf033fd05a9e61ae18346a0a3d60642deb145390c4ad02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f77c92bed0f580ff3b603ebd0299d38
SHA142a4c181164ffd84946d5cbe836e7e0c4a4b0904
SHA25642bbb4f818c5957ad674046216af4fb7ade79f15c2533d4929cea51ebf3d7a58
SHA512f6f95be67e87346fae689005972c20555274675f237b7b6a8e921a6b9b26d4cceec64d2e97ef65d065583bde094720d94fb462f6553ed4d101fe5b61f6e22ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5098ad5f36782c62111c1aff6c14e46d7
SHA1caea1a16588fc67447ef2f9d9e897a7376dd43f5
SHA2566a5696cae6ed632c4ad9d44b6d6c9eaca18232dbc3abbda013b58d14b8e58212
SHA512795ca2e321d80780c68c13c59456a46ca30fe8bced0883fb4f3042eec91a529475d074822a4c213bf1ac19f6b98c57be5e01fd7f92c099560c5988250e018957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a08f89ad4d98fdc883354e74a330768
SHA1ac7dede927a07084d9dc01ba2a7ee0e0abf9c90b
SHA25607e0d41814bfda6ed26fd59dc4b9a73c847c5be6c8e32ff022d6d616dad0dcda
SHA512efca8e3d075da6496653677da0f8c3a8d8e362fdb551d43336ea39c4bec2e5887e5fe0906651ae931436425c3279f1ef80a8aa87415dddbb4ef48bfa4cb27198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea520bb26fd543def7c6264cb0de5e02
SHA1e1f8dc690da1fd1764353aa1761fe70085575c20
SHA256f4ebe45a9003d6473cf42ac48fe05397feccb681f50330a6d577bbf96cb145b8
SHA51276e6a85e187598446e8ddea8b338080232610c190961e7b99193a3a435b7dc15ccfe56d657739295fa0992cf73effec6196159788416e048f068ceae4f5018d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ac60237859e57f91be49ec970142fb5
SHA1a3184c3ab26cfb3dcaee4aea5ad3fcafc6bf7517
SHA256c2dbf4a82f6d4b137344ec9fcbc18ea9cd221ba9715c60213978d790259bc388
SHA512632f0a8b1e05572ed7c85706b33ca05d195b2da21fcae9afa8f2181780856921f9b736f361ff6e7c7fc7417007fc0e49c66a2b64b63a1a40e960ed34103000b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5914f30b8a60ddfbf3beb61c83ebba598
SHA18cbe0fef88f167d186dfb1470775684dd83af4db
SHA2568f9ecb5ffed30273a53143a8fcf882fba7db03815db053d49b969eaf027aabc2
SHA512189d156f032ba661d525e3f4b7e0274e6715314adf9d1a1c52cec396ca370dddae5cccec756b00d27eaf214f1f0f91c5a78dd3027b969ceda389ae60ea2578b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571b43454e91bbb2fd292b2c0d1be24d9
SHA1899d89b2cdcf0a9ac68b6e5ff7049e328c167762
SHA2565e84c7525052bc8efa20b897e3fa78ea19cb7216b7e45f8022c04cf43d68311a
SHA512ab23fd1d952e2283695140918ea7f7acbd896fd15b79980c3890de90e768a73a5ca3c4d4d70f70103f7ceaf0ddeb097a4d0bbf3a05d5c03c9c68325b12b98224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557324f52f8e53dadb70cbf21c472a317
SHA10b7575a8ad17a5cd4d1fdcea64ab0de5155dd2a7
SHA2569874a07aae06c2f18dfb6b9d18a670211406b648dd44c5eaba1b89ab1f95d094
SHA512c26184a69d24a0711e4fce6ee088b07dda00d83851beb5143da43b363d838f2fd8daf5ccf7d6ef886b658809984313748088ba914af24623b2b4cc75a9759201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528245c8a9798e8e87c1b8dd8b2dc947f
SHA144690ccbbc6a2cd4a18f8b32c7f2f129bb56b4d4
SHA25693a53d7b327e13c145098cab6ac6c6a8cc1424aebc0f822b45ccd44ee5978941
SHA512613eff1873f945fea2309cffddc08f029eac86290e58b14c2704a34e2696708701b38a75c5785e558915a88bb074e90bd2f3244dbc81fb47d39d4ec1d7cee4d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579699d683e507e76529bde0e5403e305
SHA1fd414480c30dcf653ac1444c7debf281e2226c1a
SHA256aaded21232c1cedae1ba95f64a03ee0b90dd7ba5aa350ec9a257f78c39deb0bc
SHA51256d119aca7e54e8079e5a60795e8cdd374a3723243a15eaaa6b5113534de46b54fea623e3f83ca63416071a1c7330215800a86350c9d453aa8e402f84e74d837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b446fa225aef58ffb216eabe2a687054
SHA1fa6ec0ef324b493536246fe4cf68e720edc049c1
SHA256bd205f4f7aad3a62ef2ba6759ad15e36f66f5dd5c130f175bd79dfef1a7e5229
SHA51226019f62a4143d22aad5faaf9d73505c12a829cfd15fbd4f18f30b4f5b972f307186b9f323eb32ef28778d53fb50081abfe840a9411466abc20bded187f57538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd93bb25cc125d7c22d86e3eff299de
SHA1b17ee53671ab0edc4e089f79a885891ff2607199
SHA2562126a6f8dce3d43d9791d74cd7e05e5ea00575c8c9ea11a03bc35948a8b36244
SHA512bc40447882a44599c6d2bd68510769227186961c64147f554ce38fdad05bcc23089749d63673b0de3fb0026f35549bd052bd716daac7263ce94da7fb5bc1ea94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab0a7452211ad695bb6f98f9bdac76ab
SHA16e681571b54db6a73358917ee1f02959d320a974
SHA2569cf7f01b40738ae228ba825f1a0bc81915c93614eeb2c6e19395a02532512f53
SHA5120caa13fe7eeeebf3691d6d4dcda693cd4156cf9aaef5e1020e76cf0d132726c9d471c73dd356bb1e8bd73f7fae6eabf75f654c289693c32f4da80200b7420de0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dd9e135d668989607ade910972c96e5
SHA1bd9b95cd39e9f27d7db310ffc0c39bae2b6182dd
SHA256e3e3ecb28544769fccbd3b40db560d16bcdc3ce26e34ba2d32e0b0f5ccdc0a1c
SHA512f79a223665da379e911f2e62257820db53795aa0810e996efa8dc1348404717a42619f7437d5c867404c8216390056a32f5befe3179e195111fee76b934cf831
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b