Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 06:07
Static task
static1
Behavioral task
behavioral1
Sample
488b4495e3976cfb465c35a628ddc4d7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
488b4495e3976cfb465c35a628ddc4d7_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
488b4495e3976cfb465c35a628ddc4d7_JaffaCakes118.html
-
Size
12KB
-
MD5
488b4495e3976cfb465c35a628ddc4d7
-
SHA1
67df6354df1901fcbb050e5cb280be1a157d439e
-
SHA256
96f45b752c3c8e6d98a695f83d337bdcf57a973563b003db7f1c22b2c54f642d
-
SHA512
1211c679146602df5a8f5d29f6f3b249e67e44a3d525ee75f81802eec8bbb9d61b64c1199fdd6b7573d0e8923842a8f2b20ac8e894cd8f4df5868f856895de95
-
SSDEEP
192:FQMtmj/UziaCsOhAhAnqo/lX14v1ooPt6uqQBMINCTW4ridwcfff2LWfv+Npb:FQOz+sOehePlXSdo4xr4ri0Zpb
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{872D8B31-4270-11EF-90E9-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000b29813a3f1dea82a48b95230f63d9d5b4b8c2b4d461d863f7f0e6bfb86f7395e000000000e800000000200002000000014dfb5ced7ee0858ebb1cfbf1e59a5b58bcf1f17902ead2e226108db0e8e478c20000000ba016a19b974e35fd433926ba98020909be15aa4a560af4072fac3283d23b07540000000f9b83ba5ac8069bf635c57f35f31266183e5e6316e9b700c7b10a58c9ae93958c2632d1ecb2da8c08f57e91ae5ea9a6bc792dbc3d23a16f20447f9f66be9d90f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427185521" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05fbe5b7dd6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1408 1984 iexplore.exe 31 PID 1984 wrote to memory of 1408 1984 iexplore.exe 31 PID 1984 wrote to memory of 1408 1984 iexplore.exe 31 PID 1984 wrote to memory of 1408 1984 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\488b4495e3976cfb465c35a628ddc4d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e47f21c7fd6ba525b0a39f2f79dbe85
SHA1efe35acdc0f7f28c23d8fa8841e19b2e293014fb
SHA256e548d23cf0f431ae7467ab44b06e6cd079336984dfb2469e9e5f83c277c8cc20
SHA5121ce2a43ddde937b3b3750854fa76c2fa98e1f1098e95a954d3520525b9a47794368fd5f29269b418ccff75de08bd787bddb6039eed15769cdc1c045f4776949d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540a6f3537ea2e91bfdb36d1222eccb1c
SHA15da7d031e724a211eb238a681d51b4e95394b3a5
SHA256870278bc0fc29ed6ff03c466ea55ba21ca946d41c719320d5c201e321c255f3d
SHA512dc846f922bf775b7a06b14b3849a7a4561544f3181a262daace6082bb8b792094a156d739cdddc6073f4f081e167df3eea4be250e3305a16d60b405ac1326b33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530a01cb09602aecfa34c01ef13e88bab
SHA16974ab6d8ec78de4b4bd72c5e9551647ef6dbef7
SHA2566136c8fd464a5bd6d27b054f8ad074bf4a856cd81eec6a142ff711b3b4a5ab4f
SHA51284565a4cfed146c455b8e1a05d8c20763d69b5c22d2689f70310b64fd0462af520f0f06ea68d83ac2e3507b6c1c4dfc70d7e3b1fab0b38253c211a48c5b6b4cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5002d9f6a57f5318ae6a72bf5e0244346
SHA1884767a318e62250192689cd2ca454bb39102809
SHA256640b6c6080b35c56349c44e7639aad392f26eb655e12bc1a79ce8303baf5c5c4
SHA51247412b909741c50b186e586c59fc2bbdc59c2b1f8c52b5bd781cc59d69dcb2ecd6e516d03af89671a5d8ab5e23dd440a1d9e980e10d80d9dd9c35ae91cba0ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c6814df9c791434e32251864a7a3e81
SHA197f4beb82acfc40ce90c3de7dbdd8cc20d685cce
SHA256d73edce1c0ed89367d5385640f1d1c8c114792c9825ed7f29824c0b7ad1ef117
SHA5126fe8950d58efef0346c4d5e5dd4b5f1f290571bc98e17fda9a4937ce7d23c974aa4845fdec3f7251508794d763f3b988f7a91f021e14d7e80030d3974a88c3a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564855533f1f982bebc7c345ff42ba29f
SHA1dc3ca821cf6d7001793c0cddd2e2e3344141216d
SHA256a9103d86066233c04e66d560512f23fe7308d7056ac7671816d5cf4e84cb8926
SHA51256b6a146433c728aecaa15a433172c1c32e8e87520ea1e3162230a010b9cc8b2f89a36d503a6efce108bdc0adb3f71ab2c1edcef6424d59076e62ac13d5bc984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7976183fc14510a9a7689105063c6f2
SHA11d5a89b1e5d4edb0ea8bacdfb17527f20eb23a0a
SHA256577507cbd23930b3f34c0cad5227ff0ba43622416508896ad3e2b6d9ee1bcba7
SHA5125a70c3d42acc46b4f5083d936ded9d835a12f520fc47c3c537b99ba84377138ed2cb8e42393d582f3f5f96454936d5ec3b52e5c8206c0e114838f7e97f6a80e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b81f23981acf68022c378593b13cc520
SHA100f8bede6a9d8d6eb83c8a17ecc247b86da0cbab
SHA2568339b4373ef369785fa017d8f62736fc3e9d0216e913803bda436a58a6fbbd60
SHA5125ebce8d39643eaecf62199fdd0791e648e07a282ae54dd1c5e7dd07b4df564a6fce5ddcdb19592681587973fd6b682c0e673a76b2e4cea5322cbec5eb5ba211d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5256a1da21262500aa3bdca01d874fa9f
SHA110b612b024001120e6f5849eb821827c010caba3
SHA256af230743844a12ff43431dc642e1bda580fe50b377dad073e73993d456947850
SHA512cfe63eda8f36b4bb1d1fecf9b91e208f85937e5b67a2d915dfbbb3432d0d72753205d0dc6373e92a728de8794c95dd590c8b6ea1a8368ca97ea781cd5a15f3c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5758d5f03a598140ad062660a28471207
SHA16f346d0789bd96aa08b8ff338eeef03cfacf5435
SHA2563044edf753f1f4d35bc5cd5140706399e7e90abbd6952cf01aeb00b640e0d29b
SHA512a37eb058fd37af3cc8a122c59998bb1655ec268cca81eb0964a8e29c151fd4ec27ca3ad62c23fa42a91c23b4e98b698f05fc13131290440a56bdd7af6eb61a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524b6b93179ae3d08ce43f9da6b26fc77
SHA15e40080d020028e88251a86d27059ea6f01b886e
SHA256fd5d4745ed6ebdb1c45bdfe3c8b9c49983b33f0afd9bf2a9d8cafca01a7d604e
SHA5121d01a28d0c52f4d8cfea16a7d9d417f284787499578162c53f3da072efc4dc2b38ddd3fc600347e282027097f24245a18a8f0fb0353345a06a2352d30e85684a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509411e468c330b753d93d21fceafb096
SHA11b9bdf8bbad4472f08c592a81ea84dd0eec962c1
SHA256641fe624acf4ac314cb04e36c355bf6559203de0f9675726b4be7a0c36063013
SHA512520337a51723626c34d526dee5a6086e0a7ba5648cec9af42969c7de8002edc14657f246822a23dc83fbf91dcb0cd52e6084963f8c5b759cb75ff5ae69d2cf19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1b3d616cfdf966ab78227f68964d18e
SHA13aed9b39dcde42a040a6d818ac51204c4853b9db
SHA25693494bac98be0347d1470e46b207ce5c67eb3d21ed758c2ded40b1a60975c3c9
SHA51261af5adc82844d94b4abfdb7e985c4dae66348f4edad74c77855618ea2b3f46afaf1d5d073248c165e89e550f1916899042547bd48ad53b8a64ee24715f82bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a200ead2f6de380819b9cdc5528bc341
SHA14a56dc22120c84200588a4ff77c074e7604d55a7
SHA2569521e04352763ede0abb5717da97f7c4351b745940ce4b6536cd2aefe9853019
SHA5129de76d98be940ff11d4420d565b8230ab754ce09fd165f39ea055a703dbff4bd7b4185e1b0b375dd10b522f0eb7e284c96257c2972a47d2f57a5bafe2ada7006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560bcccd2db7f5beef2cdf0dc0ff58d78
SHA1496ba9a2db318f3eb9eb32d3457bbdee786f8336
SHA256c6d56098544467a070a0f7c47c3c6cf132b35f201b5cb962738c71f3bcf7f70b
SHA512710e6df4cf52bb0aaebda0c28d74bcf9bd10d136f3a150cf6cb752e47a59aa4bcf09bf466c811487f92562e4313de086c8d68e02f4d451dc33b04ddaa1110390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c677ae72d6e68f04343d97db4783a0c9
SHA1b11c4c536a336b3aff8e6dc860c802f8f665e0c2
SHA256297d456a84aa0c75da1dfdc1d192a48770851f7e903839c3f85a58b5f9185704
SHA512f2ca13e78a8b0c1b1a17396c5ae4f2d6a454d4ede12d337164762bdb57a920cd23c47c70941b9cb1653ce8ebdc4c6d051e3db428e1a19c69f9999e24a075ef9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8ece4c3c009b0ccb6d603495a06a614
SHA1446f0f402ad6c450928774de7770a069bcf6afda
SHA2562c7309a342a6159a7119717bd57d7bd089dd261254dfcd5b83dc945faa20c5b3
SHA512c43429e679c4fb1a7c942744677992eb52c6325190073a3931a459e9d697303a8441d47df4253c99a57e1ee6bdfd2939df9535d6b612093e5f1f9dbc99ca84ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca2ff2332daffda46f4a1fcfdd0b5230
SHA1880ae4285326f09b347b323764858f597ec040c7
SHA2568cca2ab1daecef2c6d36281367d7523c5421e720ed5a0873fb085061e2c29e8d
SHA512763b75ad46e05282b9f2e6f3308d4a3b7ba3616dd90738e65b12194ce5459e744747fe01e0d9dd1d9694ab105d7c91fca6d3ac8dc946354254235d39515df5ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6d0fbd381c693030de0d2312d177109
SHA1c2bc353fd5369d3d2935a17b86babf0cc18dd08e
SHA2562e1eaf9529eacc9e5169b8a2bd247ec2a7b1eaa1190dabdc56ee684f7cf75d43
SHA512028efdeebad6b11f7693918a473346c5376432ff8c58a1dfcde5d68a3e3cf840cd2a3a9efb65c2fa99994a900d6db85db93eba26e294918de8bf7eefd73cc7cd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b