Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 05:35
Static task
static1
Behavioral task
behavioral1
Sample
486f60c545462621bc2575625e22503d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
486f60c545462621bc2575625e22503d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
486f60c545462621bc2575625e22503d_JaffaCakes118.html
-
Size
2KB
-
MD5
486f60c545462621bc2575625e22503d
-
SHA1
45280be0d948c7bc287f74bf576d27dfc505a0de
-
SHA256
3cbd87f48401f742b65a8401daa141245c84652a4f5e791a6cd95015617ac341
-
SHA512
ae06581600f90e744c3779876683c634b7b69d697df1f7425113289508263d71cebcfaf678b259e5ebe3cd32d7fe346a40381e14e5bad7c6353ccdd4e5d8dcab
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC446F61-426B-11EF-A248-D2C9064578DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427183570" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000d5dffcb3b8e30460606ae1a6b635452c7a0a82e0c8c740bf237150126577b70b000000000e8000000002000020000000e5c2a0f57dc59982128c6da7205eced1ed34345fceb475029eabae869f3fc8e1200000005bdd5bcec974962232c9486c7a17abbb689b3ad687ddce2ceedd3d901cb5cd314000000075ba5836ccfe5499dcb720c039f309b114e8fadacfafac7de1a1d0848ced5cd50fa171c8a6696cd2e6391c8db26de091eaad4bfbb7d1e02deccbf4367b169f6b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05c5ed278d6da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1648 iexplore.exe 1648 iexplore.exe 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE 1504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1648 wrote to memory of 1504 1648 iexplore.exe 31 PID 1648 wrote to memory of 1504 1648 iexplore.exe 31 PID 1648 wrote to memory of 1504 1648 iexplore.exe 31 PID 1648 wrote to memory of 1504 1648 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\486f60c545462621bc2575625e22503d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1648 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54235a612f8df4d506ef84ee22eb6db0d
SHA12c2155b08333cf21be5376029ae795838b36c8c0
SHA2568165707fe3a98fa7ab71ee94d158cd7f62c06ef5de446ef510f5b8fd58d4cf49
SHA512870ddcee8b28b584b546fcc848cdd9d8c727bcf5c6c30a6e76fa72434901c59a89f78dcf9eaf642f335bb4657711bbb816bdb61a4f7329b5044e5826dec830c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5087ce8cd85a91d0d471dce9b95e9d931
SHA13e2788c58778f31fad5c5210f9781d58316f0747
SHA256822c9cdd8fa42252ffcc8beb3bfc68175acc06bbd66eb4b757cc0c27379700ac
SHA5120cd782f1bb6361e98bcf2db2fcad2fb239cb8b17238cbe207ba435e6a72e98d258bf38589106f03eb571c30252ea10b0034f52e9341150b0542e92cbe0173519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596a40027c58139a82385e1429b72b15e
SHA1aafe5817272f435eb18272e6d6893da65278652f
SHA256fae42219b21791e51a04095e6126a231a4075e1ef002a58685edb638e9dcf6a6
SHA512d01bcb56d2ad91ae260161070df495878b1da164103da773644d6a5cae0fba34beaf0b14131a9f9453c96652d4fbb76183b6e89f7e960435234879ab9c57ca74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528f49784c9d7433bf6283c727e1863ee
SHA128b0af20ead93fb6176159700bc6a6e4a2d13dde
SHA25696f91dde3b937c8d6913cab227b46e5fbf1129d26701809258da6f3a0f1e5f93
SHA5127c1b9d0935e1db88670afd8c8e929f17abf33da455b866dee944553762dac79e973bc9e8469a16ef7dc8dbe97ab00e48b1bf35cd3d717ea4e5a97bba5e1db4b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e66ed49dd1755c183e92f87a0d5fa336
SHA1f28349499568c323230e1b8796ecb22a21038502
SHA2562e49c799fc12089ce4470da92dfec651663646e347b32fde026d10c225f11131
SHA512503c6299f210eacdf636fb3a18438d8f40bab94e3ded7b65c1ebc8ffcc68f6bcc2a55b4550e53896f0a05afa91415e5acb607fbfef41ace6c9392509363cdc34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4f3fd70f8d9c82498b88a5a08e38f9c
SHA1ad655a59f4ac1fc977c146b5cfc78a797281a86e
SHA256a94492daf0fbc2887f00e0679dd4e39f77203090fe622d70782d95dd5f58d50d
SHA512d16812d78962752fc1b19cc577edd439ae5199b00784980cf53bf57c33e0666963e436de400ac4ad129b57f11c03679234247fa94f7bfba921a783f7cfdd0bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3f8cd17d2df39dfea87d3274b4d62ef
SHA15bed3e17472f0b60e75206a0f491f101880e6edb
SHA256fffa1904ad391321c462216c87775a5e81cb618139620c86584b1f0207c6e22f
SHA51264a127d12000d208e1e048251e5bb11bdf31661c1cc0749b901a54f4d3252a6cb7f9072ffc31aeca109639cebbe8f3f828c2afcce9204d23ae7360265cc63364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a1ab0adb5acf7d93b46ce2ef2e14e53
SHA10f1f1a18c291a7cfbf977ec5a9ddb2029eba41f1
SHA2561a1048df149aa4a133e3376926d587805819b796d12108a2116fa126d8130607
SHA512ca4e809c4a380164e21eee48c9f65a037e9774401cc46aa2dde2ac4d968e3851f1ecbf269246af982a79379c9e4f727f78f1d59053805b5e240b6a7de0a3c463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f25f43af3cc74ff081bb03b44368df7d
SHA150763ec051e25259fbc6bda36d3af65416755fcc
SHA256705b96b1af47077edee0445c510cf5c73c06e2d7d8149810a333c4cee8e650f1
SHA512bc3ad3789a952371a99ab8d50b37b26b2ef02f3911282fc59fc4c04ffd256303cff48c10b240221d5626bd6b67a0bc105ebd03d255cc874b64d78a9fdcbbe53c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9956ee182a3061ec2e8064edcbac026
SHA1396955e3d60fd0a8ac2109724f1507095d2d340f
SHA25658a6b210bf44ba9d4081c0d5d529bb3d25da51bb7d191d4a92722afec1cfe4fd
SHA5125ba2743ea5a32de2f7dc1d6da717fec32a2d946a5b4f7ad6f1a8de6d6cbe26ba831e3261da651e5a6cae4a5a5174b52c24031bd6403e271a6ecf78780165a314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50663a3f2a2f42ac7866d1cb9a9f4d236
SHA1f841c13c2c4ac838aeaf1e62064b673e23ae6e6d
SHA2567963956abcb51174fa99d9d17cbdf65cea9c3ec4887ec3e3d96e1d1da86d53ee
SHA512aa39f1fd0cf97329da641c7875989dd80946d4b105310c116ffc69af5cfb90f05bb5c9b7b845c6f4359781bfa37c506a0712ccf1280b29c1dbe6be2ba9afac09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e6c93ee8207587151353f09d64311b0
SHA1fdbd79155cd2666bda41ddcffd755a172217e445
SHA256cf3ec871d68b534cd930e3d015cb05cf02ad08720842b70baf38c69e7968c314
SHA5124f16b973e293d306bb12d6cd90a96005bb6572ca0c855be20ffa247b2a00c76622e0ddcc931a0d8476f6fa76358829fa384f8e5db8e367731f7bbe463e078098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ecf02492fbb493e2b5c5292ecbc7ae
SHA130568dbeff6ebfa8d721dbec5257e08b48631864
SHA256dd7f4b73c6a5015ad2134b959a90ac9dfd2f3a9ac8a4b5435551df1e284fe4d8
SHA5126b68d4a68a930e9760c6fe52412729b31808d03250116a9d95ba2653651dfe390af54f73ba646375becf0ad76dbd697641e2aca53584260094f4e5f07f104408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560188689fdb4b7c7ccb1677238ca1d44
SHA19a524ca5a71e880f94c3bc9e661968353b446b18
SHA25601c03df5bdc827404baa4f64c8ac5bb0098258612cd9a0b1bbae00b978e92c01
SHA512738bfbb445ce5ce5fc188f581b3cf3e0258a063df1c6665874aa4774dc64de14d667153ae8e93c36b849ffeb9c4a53ab4f395a9a649d6968947a2b43ffae4802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa1eeae78b03423b30997405efd09c27
SHA1ac244ed2edeb1373df2f83250304c52fea65e6be
SHA256db8fe2e9e9eb1eaa35cf8dd7b5b6d3bbc57e5904d5812aa603c4ec4f6e355045
SHA512dd9b5230e6b2948fc30433e57c5a5fcadeaa897eb1068d34099b812decb1a1139df8f7b9398a17972ccff3a66137f397a0fdb5ad6e6172874c3474d37ecdf1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532a7a978f7b436b547c38f0f120cb1ae
SHA1cbe7da713e3783c5eb8693c3e49dc1e88a9d70d2
SHA2563e99b864209bd36d02357058031047cd3f2eae2a35ecc013723aa5c378b9efdf
SHA51229abcea45ef8ee300a2e65d605b541a84ddefa2b38be059d66bb10d97eb5233122283291777e562ecf1a49188dc4e84b335549c8fb93da6cd5859919bec9059a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52daddce82e114b7bf8beaa89fefdd1d3
SHA1c3ea6734d64dee5df06b603198710ecf33add2fb
SHA2569ad2c4699045c706b1afb116f92ff9022b14e7197c8a6a7284da18cb73cf08d0
SHA512a6f1c9051cb64faf004f21e013413154039ca02862461520f1d02d70621fe8fbd02917c2eb7a7248b64331c4c2e368d4bba216a14c9b338584e523c185710857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1dd3c0f20464de5d27651f153d7a212
SHA1ab9f70b992be7f0663824c6d99c52eea2383168d
SHA25624b86d1bdf1c90bde2770d9ca3cde8b1ae5cf744b4375b3f2ebafde9df141719
SHA5127a9520fb2371a22aaebbb647fc0587879402fba51504c79947c390e52dfd44a1348139ecb389854da5e9d0dfa64212a486def882e8f01c6354b0d28bb973e86c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d463015777213a2a4da234bcdbc9905
SHA174914d0072d3e5fd8e9aedfc9458009234dfe38d
SHA256917c20acdb3f3ca29ebfddfe53da40503dc001324753aa3b836c4252bdfbc225
SHA512dd8dabb7207912e5a7f7973e7d17800cf752c2268c00efb8175fa2ffe504b406f1185c001fb148fa48fde07bd559f8280679f8c7228e5b78561801026e57f991
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b