Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
4a920900c2760f08efc02b166374c221_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4a920900c2760f08efc02b166374c221_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4a920900c2760f08efc02b166374c221_JaffaCakes118.html
-
Size
1KB
-
MD5
4a920900c2760f08efc02b166374c221
-
SHA1
0d0325a8492187dc587b2f702b7a9dceb49f5029
-
SHA256
2addde6cc88cf459916c14bf81fffa83b5093ae4fb05884f4865de3eacbabab4
-
SHA512
4f5dafa7e77c3c83ed64f34d3f98a91fac6536dc0151bb552e214d011c67ed9cfea0e00291c27e59d38ec04584036730717963e09afb289824207fd98a584f41
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E08F521-42CB-11EF-9514-72D30ED4C808} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427224458" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000f36d9a6a727b7c19267f682468b64dc165b6557bcbd21f04368e800fffd495f9000000000e8000000002000020000000154cc2366c2c88637bbb5ed267e6d539e2cec6a768607a34885c41d10caba875200000000bcb7540204d4cd4496580c269c82c6040853c25e55c11c3f1ea43138fda4c1840000000bb7a28f63b211dfb2eb54621095f888acd4af01611086aabe8cdd34c8eec4a7f483de4f28b8735e0caaf798b727adc942ec1c9208f62d916dfbc315cc3c058bf iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 806be903d8d6da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2852 2212 iexplore.exe 30 PID 2212 wrote to memory of 2852 2212 iexplore.exe 30 PID 2212 wrote to memory of 2852 2212 iexplore.exe 30 PID 2212 wrote to memory of 2852 2212 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4a920900c2760f08efc02b166374c221_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58005b18018e7fa96091049a29a704436
SHA12e73c37aa21e633007346f0fba8830d3ab2c06fe
SHA25635b70bd4c5808242b1cbd8b0c043fc260e78c828e48b60b91a0d3d14f76169ca
SHA51222b3d25220b72375384acc8790781349e0b7269c7faaedc2ee8d4ac8a698a9cc1b2bccdafb41e2244b0f0562fecdeb69e937275eaaeebe7cd185e6816a243871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4409c765d0b8c6b34af11bdb0b6069f
SHA116923f023eff5774872364828f61283c637cfb00
SHA25678e67feb876eb0ea55d291d2484c6714e69a64b839a9ab1453656ce5fd9f6d48
SHA5123f708e665bf45bad28da69f7ccba8f8bc171aa002cb6ac78e2de9f6f9dc283ca88a1d2ce6fccc47a010191971771216bde30a42ddcc1581027164794b5100921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af149f4ba1198b6ffd8c20e5b356c5a7
SHA1c95169838eadfd6c9d8890f6644b0688f89526af
SHA2565e386959dce4637f2e40430fb6d8ed58c3047645d86d8a0449875049a518b718
SHA51247ee1e3a24387025fd6f6e3f133964bbc2ae749e4ba319cb6976b28c7cfbdfbf529c681dc343a94034bccb0b0e3fdf135e72b917f9ef1a3ac8b569d2163d4483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5316e9fa4580cd7f998e03af146e598be
SHA1e4e95f23e7da54ca49766f46ae367215e13b8d07
SHA2561832e96139b40f73c40c6f5e76aa33568b8c9da2c389eec9737c2ee651494407
SHA51250ad340f73cb81203697c59888938addcc68575e9594f291e3933fb82dadbc3136174a9aff014f91d76597dc1e2b4709562932c7dad413ffdbb40c1c393b35e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fac437df8f0baab819e8596f9002a45
SHA1886876f5dacd52fa717495dc67f77fc9c662baaa
SHA25682211513444bf176d9f2ad62c61ccb079f0302d01cb07e87231d2b2225b6a4c9
SHA51224341b0de5d85c671ad4fa1e43c9be4ded6120a2dee5d60bdf89c7fcd9a6df5cc939ab40196f60d98eadce019c69255f73279e17af4a9931eebe75823b1d9ffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbca380e060adf6452decf9f2c6126b9
SHA1caa04b3f2e418890269b3610f4d3eff207c95b34
SHA25660e57c756ad304ecab88f079f096afca6e796d6e3d60c7ec6f3d63aee93ac10f
SHA512e720cc517b4181a72872bc8b9a97a2b5f0a129f1ea517d404b68fa5f3ef0407771a05192f929bb6319f3a74b4185c65f56e991a629b3d3f06edd62358c612d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e737f159329e8ae872e053a7b7b537f6
SHA11e1041c57cfcd61969a8554f0cae826ce5e75909
SHA2568cea18626e8e03d71274001c98d00c898891ca6e843edb6e2d8768da4bafa969
SHA5128f196be827ea953dffc2fdf074d396e14568892df6cf6a7a2c4d2b960e7ecb17c71aff145cd51adcd892539c8356d34ff09abdc3b17c0b063257727da22033fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e284b093d4ab5c197a7f8fdd778676c6
SHA15908aeeca064496dea77c3f533e88156bbbd15fe
SHA2566a06b7856a3bc4b398d7b11409f884e58b3e775ed9f621917ed0cba7c7369fa0
SHA51299803410569d4a3404cdacd2654ae758f39004053479cc9214fbd9ec7a47dffa68806321358c09a553c7e4ced7a8f4afa380ccb7665fc771ddc56eb2c8a65860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cccdc4e1b6127f028234cd647fe8e078
SHA10911f8e59d31ec4dc67cfce4d61834f908e5f741
SHA2565a02e7d83916aad8c7ba259b96a940be3fef0d6d50416bd996d7c7e0a9de6c81
SHA5123578118b98f39497ebaa6d9203f90ba594ef4d8f004fc1b34d7c7d3b315a57f8327abe9e255d8a8897ec0b7a8112b0a8bc5cdd1f9c27d710dcd408338ab47c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e84bfd5a1ba4098505ba1b4c57c3c692
SHA1f6da2b2b912185dc300f6f2a3fa7f2570aa3b203
SHA25668f9d585f7108a88837a80bc1a582a801882f762781792e3a55f300bc456d555
SHA51281d56173b247c2f5bdf58efa66a5e28a31f5bece7999e25fc8886732dc4e48a3ab9491d2170ba2eef6a84c9acffacf8157ec720c19e83bb711f7e3f418c06974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eacc72663bf2b18f0adcdb81f0274d9e
SHA1db31330007b9ba18a908f8da7d0268381a7f0504
SHA2560eadc140bc63d59f1b703f60a0ce56a0efd412b6a4a1181d50828bfd7627727a
SHA5125e3d923e87da498a61831f02fb4d862c5156f02e3dfc355eed350ffc1db4abdbf3bc646370a1f37d82ce4afcfad1df0b0ce90b59b7bf1e5f0a44e4f96fba8eb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1327f7e6481b9e88fd94be135608683
SHA1a1b898bcf35933c12c64efd3aaf75327ce1e6fd6
SHA256cb7024cee3d57fee6132298292fccbef0f89cea0663a16727c80dbeae36333ac
SHA512a47b1e484c6bef3013a324213e470d42ca64240c65cb69e32018f6c63b3dad41acee92c36c6b5f74a497ff0327cf1b31732094e67763904d6cc0b085971e3436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526fba797c361e671c4b39428f4d71fda
SHA1e8805f536f10f651be91cdc125909e0cbd5f356f
SHA256bb4b06c75d7306bac907f7ec5b677bd4c4bc09570bb8b70009dd2e0e4d88f89c
SHA5120f97c1008f8ed166a0c9450f7af79ef73f5a7bad9f03d8dd03fe1251112e3052cedd62f58dbccf2de170d3da4332ab6236ed82987c2b22bc1688864d7cc91fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04b37f0172d7c1ddacf6f716ca85401
SHA1ecc4ab1221e46d10671a9f1a38c86031f9f08058
SHA256e96305f2bafd0e93f677264721599863f57d2e9d44633eaccf93b8771283c3a4
SHA51242afbf970f57956ca07b690c8707afe1e888d7d0842cd5781bf55846600194facbeacc3b483a9cc8947a59d42a664d06168c7355809e361a7e00a74354c05401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8e96f6248f9601c75b402c62bed7044
SHA15ab1633dad30d8f71b5aacc84047755a615c679f
SHA25604492ef5a4b1e1ab22bd6ba7b377eb988c8119411c4ff364ce8613b2d7d1e073
SHA5123e2320715edf920b604fc9485a1e790ae5e7878ea14383a68d2b55d8727404fa59a9ed56459e7482cac06aa58c7e30e0136b266fe6f9c29e909d8c7df657d39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c57e07d1c47a4126bb7333b5442ff88
SHA1d8c182eaafc9eacc1737f40a7c0d5a44bf91beae
SHA256c1a2100bfd6a25aa86490aefa177034e8eab44a9c422f0b3a8458c4c96bbdd96
SHA51295410e2c63eb11849566610f41df0804b300fdbf14907fb05561fb1166ecc0664f42c3870552bd4d4f1f69cb878f8037a3760b65815d32bd45a418230cf49078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdf461317b3a0332b5f5b5db4dc52f4a
SHA1290bfde47acf9f36dc4805faaf7596c2b0a77ecd
SHA2561c6ea34bf92956e8a566da8790b54024e29e4c535d9111876220464633af6d41
SHA5127ca41201f8cda28ede8666a02002a7cc4d22fd75d883141a421e775291addd36ccea7d3c0c6c57041b7aa61773e67e7e7690d3e9e5e70bb22b3270fccc4ae947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b7b33540afcbe746fdfcb01318a1e4a
SHA173fd7b1855f732a72d67b04f9e8b23f7b067bfb2
SHA256384ec64269149ebcccd6d4710ae153524ee4a51234c24e6979baa48fda123924
SHA512172b571d7ebb7e0205218edb47464d9fbb4a8339ec44010fe5ad15c198b44785572ce4ddbec705c06abf8662d840a2d22950f9fe6bc7653e18708d7caac15766
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b