Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 18:12
Static task
static1
Behavioral task
behavioral1
Sample
46f1ced34dd683e7e16762feb6c3c846_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
46f1ced34dd683e7e16762feb6c3c846_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
46f1ced34dd683e7e16762feb6c3c846_JaffaCakes118.html
-
Size
9KB
-
MD5
46f1ced34dd683e7e16762feb6c3c846
-
SHA1
11e54017da7a70578a6881afae3598dbb431e23d
-
SHA256
4622fce5191443a8c926ad6d8f19eda2af08c49cc05f3fd424b9fe0aa84f4464
-
SHA512
11749dcdf06e5056ec240be8b542f859c86c3da5845d3934821356ee3b4ea15d18762ebc2ed4d98db6c334fe6d433529e6b2803d3b2520496bc81f035930c66d
-
SSDEEP
96:uzVs+ux7SFLLY1k9o84d12ef7CSTUDGT/ka7prUQcM2KilVHcEZ7ru7f:csz7SFAYS/uq27PHb76f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a3bb7119d6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9708DD21-420C-11EF-8F5F-66F7CEAD1BEF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427142598" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b000000000200000000001066000000010000200000000c7bd6ba6abef27cc99abec629cafec3d7257a29e940f04d0f5d4c5f151d9b7e000000000e8000000002000020000000f110b184ab92acf33475b59f9f5528d2f11b19fb1196766a8102b8b179decaeb20000000fc56594c2965ca66913807bfe55bfd23333b0191499b6e20267d621af0fb12a040000000d78d0687e859cccb5f6f9e1f451d1e95cad399f0ae7db905239c67cd8d3ceba27c20cd5978ecb988b69d48870a012a2c3a34d2f72510b413ff6ebc99fcc0ffd0 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2472 iexplore.exe 2472 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 3032 2472 iexplore.exe 30 PID 2472 wrote to memory of 3032 2472 iexplore.exe 30 PID 2472 wrote to memory of 3032 2472 iexplore.exe 30 PID 2472 wrote to memory of 3032 2472 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\46f1ced34dd683e7e16762feb6c3c846_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c46a39c20802d81bc6731b6fcbd21bc4
SHA13250402e4810c23ed5ba149fb7b7aa115ee428e5
SHA2566e5dcd2c7e432f9de3d7ad79b371c8cc1ae0cdaf3b830f49bd81f242921cf838
SHA5123558196ab41dc43f0efd0becbb6f6bf9f5fc8c2a217d6c8eb26ca490ad8b6f51e6b8ecbc307244ae52df7952451840153eab53dc88613fd24e01d00d99eb790c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d9264d84b2f0cde625202ffcc76b33
SHA10382377c86fb8d0d517cb00741a4bbf36d584cd0
SHA2566db1615a4dbd0f4654a4abe53fece283d9a425dad7950dfe0ec119323ce429f6
SHA5125385db8b013e1136a6905785ea80bc2cec802ebb8f89b8d1315d052181f1743412e6a0050d57a911709dbfede12a055755a001ec86ac251ac847fd98faba933d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587ba161245ba08dced096855a1d7f49d
SHA1a9a443e1d033f3b0ef7161164ce3d574089d2087
SHA256eededadff84947f94b3205ce5cfa2fad56ce526b1e00efcb5100cb7829029d7b
SHA512503107a80433f5bd40799ccf8d268932026629957443d6a3663d55c47d40c87c857579dc9beeb302d4c23993b9bea05f82c70cce1ae020914a4f01434eda9857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac62e503a4960f2b598b19e8fa7db16c
SHA14a7914127f6d84a2e5e88cd1bd8f43848725af5a
SHA2560fb6a4c8bb3deb106848754e27b4d12fc0e861b8c2ae8977efce1080da7ac4f6
SHA512160fea6d4c491afb29c25e5932dc856504e0131adc1487be35444a52559b3484e9ea1954c63a27e8a789d04248d51cb35d5670ac1b971a440b7856dd1b3dadba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5315a2c956a641860389e59858533017f
SHA161832591643eeb8a3ceadd17414316bcd9ac5a14
SHA256a1b4f44aab4c9a44473f4e25157778b78a1ed8970ffcc0003623e1ad972b2dbf
SHA5123729bdce4b1ea58b81fbd2d906655a14d362d49cb4a6eef8e7be9765863ca4dcaa51a3585bc8661d7413c467c5f651abe4ea56acd90fe005a9cb12bc0c5192a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552f4ae927e20f0221852b38104103a6d
SHA1ada617dc02206206f9e1ef18b444056d3af2e8c0
SHA2565aa606e7b0f1657da50374dab166aed2343c8997c9c28cc8f3ca8e393da61ad5
SHA512ea1d3dcb0930ff44f5873e143ef979c0732a0573e4a863a554d14c51efca9fabefb42e0ab24c6ecf7b16121ce0f9401f9fb8ad2bf1d71f14eb9d953a6fc4120e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b6a15c1b4c01353f497024005b62cb8
SHA15b26d4570e121365aaaab932a796c0b3b4d3e5f8
SHA256a14a7eadf911abb3b61bbc8955f5a405168196266a7fd5104359488e6b650916
SHA512d21cf036fafc9b530eadd698021f10ed51f95ff19472b09fbe623eafeddeff37238144458d7af05657ba1c3fd70dde2dee65fa1880a6c180c6b2427fc0c74e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a784cb5aabb90077fce5f0dabbe403a3
SHA1dd1c48691c9df70b9d2073c0e56fdc6b654c0336
SHA2568f8ce02e030baa42ffbf2a174ef1a6465cf1e76b1f17b2160c944097be848a01
SHA5129675e6d126dc4a12a66ba502236f5aa219b9238fe86b58d5d60a67ac6442d3fda1a5ee3c92ce73e0b792da80ab78b348a352a9ec4a2212a485cd388bfdcf66b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c550961d70580d013cf15d5871c19e7
SHA183fb90215a50e4cdc0620b39cbc6c0097cb8fc43
SHA256891cddd7267bb6aa597d25d4fa2d4ad009299f55d5c3cbf84f38bd65a1ad771b
SHA512f628f5c166243a6d304323de23023fdf1e3f51d1f3c9b72f55ff56af031f75362561ff5c15f9bdf6709434c19e7eb06e43c5e6c5847b9a008ecd14cda35ac364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568016356236469418a9b31d16a037c64
SHA1138a696b482b39fe86f222a2d8f2130acbb78f58
SHA256cf468fe43cf25aebed880814212ac57ad6eea89e915c65825a2e03b9501af410
SHA512f16e4078bfb22910ca01612a36e0f8e3fb2137944636645e249901855b77dc7654249fbb4c7886a6e635d52ad57a6dfd516a3701592e102ffcb8c5b0cd69d3d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e68fe5280b2d06dc96632cf6b9527cc
SHA13ee9ce0589fe9bf49be0c54658bbb6b70722456e
SHA25648b90b20fda5905d5f4712153ccf549926dbd9067712ad3b976c6dc603a72b66
SHA5122b9fa75aff4be0e995853e83c7e9292a0f12412366edb7abd2491f132b9d9b46e1baf3b84b0fb8562fc1edb5ca5a07d36a3779d55aef882ca9e1b3d254597add
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fec4d61374f2edbb9ee45aa2e9fd8de2
SHA1bbb829f3b2551f72a0d5f0a65df9636a9f4d01c0
SHA2567bc42db5e71c2c614c14e9e62d61a495fbc7f3544f524045ad06fd2f48892457
SHA512b49eb75c75f22893bc168ceef1aeb83f20eac4063a825b77c425a59c96d1b11a17dd9018bbb52244d1e33942a55350152c8f06d5e149a0892a2e178a56a82b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f66d5708755e5a1245f9cf363b0b665b
SHA1ca75d5de607e1f72078b918783239165c6299392
SHA2569fb93b374fc8846c5c2821e737139471fa6021a291b802e757bc2fdf3c50f3df
SHA512ab9f7bf8bffa85b51dd51f5697e6c68e85e6a7cddfd61bff4be2f11964d98497a0781b7240a5650c7b2780b6b1e18f1909c4350cee68d0ebaf7e0ecc6952111b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e0bd4777692f5c3465cb9c7b6d6494e
SHA1dc1376e03d9dbce1d441b24b78f383e1e6981dd1
SHA2564cca9566d90bfb78576156ae29f0ba22119450fa67a49c8ab55d6bcfb319df88
SHA512f0201abb70553763888ff34cd0739d30f9b34d491813ef7af764f968b541d8f351140df839b333052a6f11d479069a127ee251ee5dfcec8e73118315ba948404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5620e7d67abfbe609aaf9d00a2f4b4fb6
SHA1b8bfec644b934cf778c87dc2e65a95238c906fee
SHA2569e547cf6853a9b9e0b3e1d72bf165e40fbff03bc16988dccd385c8f480b63319
SHA51220a01a655945a324c1979ff22895a5cf9f290ea095ae9d2b4bd5638e4226238c703e29f3237a36e080a0c032cba5c4b00bb5679a3d7e8d44327573736b51c997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513be5cf94710dd75a655d49313a4d9da
SHA1833b92184915db7cae732a44a5ed1ed73ccd4765
SHA2565dff2d5f17bdfd9f72210b7178bd3880134e59260f20f7516ae31a36edd050f5
SHA512e67d24ef99d1ad056362d78642aa56a6695768f2284ba9cb6a63e9debbd3ac08d16c12bc7e85f9dc5ac9905e9bc969e85449f4bfbe811d5e88bc8af66c3826ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c604dbdc884b1a4a550af5ea5a99b71
SHA162451885a72b8d68927c76e856faa352c68fe84e
SHA256da82c3acd1e34c847d5d52ec02afa21c3f43d468dd535ca3c829d32d432ba5ef
SHA5129b60069a200a05b43056e692c8a6f46420250c6c7bba173682e93bbdea124032e16c1b44724b2754c093ddc690f6d4f0028a6ac0b3ea438661e5800f2be40f87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510da218f518a614842277f37655c0216
SHA16e0cf58d81d92263c37cf8dca9511f5bcec35c33
SHA2562335627869c99448069ac813d7809163c13d1ca5f6cf5fe949a126848bcf3b4d
SHA5125f30962a32ff863ed38a665e978c367e7e34eca8c407f2b650128b4adb9df6e78003add44bd5f2ce98183ff854685d0424181e7e3bde975b86637d39e2584ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5843689501493b664b586739bdc024044
SHA12858d042eff76ea2f2ea078e48df7f05261c365a
SHA256ca2dc4fe19a26f386d060ee560fe3142de367de7d7a5b975dd04f44a7db21e5f
SHA512ac244978f6b4c65b559a31928e49af934be3e0ff238007d8c60dccda3b424e28d819801dc6e11988bda9bf83d793850eeb8b9a3699c8639b7a13f3f6954885dd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b