Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
4c0b1ad668990a1785c7fd7e71136bc2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4c0b1ad668990a1785c7fd7e71136bc2_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4c0b1ad668990a1785c7fd7e71136bc2_JaffaCakes118.html
-
Size
9KB
-
MD5
4c0b1ad668990a1785c7fd7e71136bc2
-
SHA1
629212424e1a0200309d7f004a1dfc53b7fdf2f4
-
SHA256
59d1db4f4485080c2bacc025c54e599953a04248eee3c49a4102bc90b72e405a
-
SHA512
79ca1c99e36de2288f2833643675389b239262b2280f766c225f7edc3a21da05dcd6bea85193be1256fee046bf3b210afaee415b829191f438e1678376e88088
-
SSDEEP
96:uzVs+ux7Ba0LLY1k9o84d12ef7CSTUNzfm1zMM1oo3/GCWtBy4ph35OQp9Rm3zGx:csz7Ba0AYS/PP63gb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e60b4916d7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000dde91ffa75dace6e9ed18c3ea6b53cd8c6cf0219c0a0be884910ba938602c112000000000e8000000002000020000000f94973a907a2e0ce1f05d483a28f31f24fcc57defdae0308ebf9746b0938f2d020000000c9c8251e1785d39c20cf76dbb30255a51d0ceed1348ce8d0066b2aeaa0886a1c40000000162d4e4afe68bc6710b7737599ec006ef8bbfa47c00b99e42e78258d6d8423220504d37b33fef35c4b051f17a62a7f9767cb41962255959668335cfa7b4c5425 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427251200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{72590CE1-4309-11EF-8920-7AF2B84EB3D8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2352 2692 iexplore.exe 30 PID 2692 wrote to memory of 2352 2692 iexplore.exe 30 PID 2692 wrote to memory of 2352 2692 iexplore.exe 30 PID 2692 wrote to memory of 2352 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4c0b1ad668990a1785c7fd7e71136bc2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a613c83dd3a671c932af057541df8c4
SHA1990daebe2293234899a9dce3d859da7ff78205ce
SHA256204d71fa9bd8d3c9e0e21416834fec77032256c0190ecf5ac901bf7161019a1b
SHA512d6f902708cfe04bc19b3de34f61b4680c2bd0c9a3bb4b94467df0022212e8224889fa3735e2e6a885c98f0029cd41952cb2562beb13c870ee9119ec49d1a79cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c24e97bb027daf27a2bbfb36da24bf90
SHA1a546ec9bc4638ba572635e4157344fabe719551c
SHA256a78c2e50576711d483d352830c3e9e3ee9f3e8c4d812ee4accad748568e7126c
SHA512264690df2b946b92f23b469c4d01c312676497b4de34aa00c7d8dd8fe70ec360f25e8f7768c9bc44748194e03230ac4aad5422d7881f8aaf8fd3e612f40d87b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deb47e70d89dbaffeb70f70e165cdfd0
SHA16fc2a7c6ab7409ff10ea6c428c1e5fc3121f0774
SHA256d6e515aba67d61ea8a3f628d2fc10c37d2ac13df01245b516b7a151310452043
SHA5127236194ab789a6b076089e28939bdba841cd7fea8619ceee9db34985e4e25e3f8133604c7cd6b874669e38b6e44098bc66b338e57233a256c15efbcaa8145b2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dd9369bc947124b3aa6c4b1b2bab170
SHA1b76dc385031c8bebcd99a58d4f078125d928a4b7
SHA256d1de84c374b54a090bbf42cf074db77ffdb46a8906d4a3fe2148ba6386eebd45
SHA5122999aec45a4cce62c99ad34712d31d0bf29925d9fff74c50bb5d1da6ced3e192f73c2743cbd934b8bb2153a2a2ca56f66c58c6c426ce07b61b0dd29f8331c6b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eafe8334311734d9e9b9c7c0b8d8ee9b
SHA11c7ca25896bd025645a8d80387b4c721df655201
SHA2562eab09c5fd0282560cb1a724b4e848df2ed6243f5e38cd196face2d4b4c607e5
SHA512b2d9d98fe41b4aa11984669770d8cd95ddd77abf4429cc54df2ea3457872dc1feccb492ca4a79230c92c4ed97ed9ad7b70aeee7245edf282faae18e192bc8ad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9bcacead2fa6179457dbdab1c0f6de7
SHA1550e6d6d1907027f8c09dfd9ac54714172f058bc
SHA2568ca56ee2788c1f0d5e2c0be857e135c7a2dc3982d0474b81f7feb115b666eaa5
SHA5123a689366a6ab53d154ac8a1e9237460d94299421b5285718ddbe70a740aa5c4ff38a2104942186aaa99e302044fe98cb28b9b1c9c11a54df17377e391d0168b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58673f2269a9bda9fd82ebecd608a5a2e
SHA1d00430991d4291236cf0320a4f0b3845f164ca72
SHA256d78e034bc8626f5e88d82e1c21b0b48bdcacd462521c1608edc4d264c09f90f6
SHA5126621a1aa38b07e6b0ffa6e7bc49f7cfc13b7310ce131df6ad30797ff3b2811306e653debccddf054c1e961bbe95285d84d85d7da8d2fa7441a0ab9b48e82d054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52675006b8ea24344b214f2eeb9b927e5
SHA1b4fff5a56d49991d2ad36b5e57ebceebec9c7d8c
SHA2566f35ca5fd6fba3c81950bd1ce6bc59cad25f992bf3c6c1ec7b4eb5c1dc8f53aa
SHA5123d6d8ea6a85c12db8cfffbe06ce8ab70a4e9359b894696ac84aef1e0c6ece0ac70e13543ea3baa669cd94c63da90390056cd7f3f6e6a7bd10f1c8a95c7da2db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548c516b3f1e5d5d6086c8a0579814945
SHA1c8443a49faf750b3726f1455b4c9ef780ed6ece3
SHA256313f9fb88b153e8eaf4f33c3676d29a2728cb7376652eb4258b5f0a7c077aab6
SHA512622d858c7a690c7bc0c65decbfef25596442c4be5a34d918a3ec151f294d74bf4a88288b4dc999f0215a1275d55ffd07380e6f5926c826cf4dc9e1365aecad5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a07ce40354ee766bad899b159a7aa5e
SHA1675c7a1116db762ad95cd3855c236f53d1e5c66e
SHA256cc8109295be663a245486c9f114a08c9e6426a648b2dfebe0e947f61d7299e29
SHA512e2e8de2a259e7d0459bca58cf8a8880d2c34a2418340abaa91975b7caa0fa8705740b962bbf5d4c3f27fdddeb6f22a52f7147046970703c1469409bf8117144d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af5348c2e0f565df72267d725b39cd26
SHA1771173548c8a0213fe69d60d8e3d8074c4b4af9b
SHA2562cf0961209e8d1d3eaed65407950abd3f0660da4127f2a5aa462226901becb1f
SHA512ff329b30ae56566e3915cd0ec78fb3ebee3f1c233460d98de04e65a27af85e74788fdd70e807694006f7ddeb8b9b16289ee06dfa95c6af44b81109ad92706daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb0005c130d721e076820a7040396749
SHA14f50e9546bb895835b27d6f9c74c8322f8a87fee
SHA256aaac6b331cf5d2917022ee51dccb2969d808bd64a97a29c3ea9a51a0ba482745
SHA512c930fedaf345010058d6e5ea6c96abfe793543b0b8714a90ec58e68ae1a4db44019cd66cd8e13d0635385a052faee66a6be118c369fdf8d53e0ff35078c6206f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d238c30f35747d681f45c8134ed343
SHA1893e61db9bec157fe849527791b016691ce2b70d
SHA25603bcb322d006ca02971bcd881d7245a57a742950a06cdb638be1cb42cd291f4c
SHA512cedb55098e47f08d6dfb3b00571a168be37620d7c2c7310eb7a60867a36f8eeabf8500e0c5c69a8f5e041604b37ffcbe39087b0eee74cd04088acb1482983866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a3c08664e295b143c156cfa26340fe6
SHA15d8b2d6cdd63011514dc5bc52ea209d8ac9f8d45
SHA25676d7bd00eac093c286d84022049204d696eb73a8a7c86b1e186483aa75913c6e
SHA512c804b4c6467687ea32ada5b5162a3945b659aa2491c491c90e92087d51622408654607b1d8c2a59306b4ba5d8afb29246419cc646899fb396bbb184d5386f7a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5839f74127adbab9d1a82413a7ef58c8a
SHA172951cb86579400d3a5a56d7a2ad0b4d5547c6b7
SHA2567030111c93b74c89ee3b524c66ca1b712ff7c78f19f5a80dab177aa3ad42a4ac
SHA512c02bca92c68ed0e83d900a199d7f87318ba90df3ebb529b2075545466edc117f01adb5c852ae7ecde2f3b1bdfaf18ebec48cb81e264064a0b030cf88f5483b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594908fb756d7988de5b9621379bbec81
SHA137883333f52c2d54b58a5572b9f8030a5e4e6229
SHA25646fa54009d2d365f34f271cedb079c4b430c83cd6023866c75860f0133b19272
SHA5127a9c620ab568f54e5dc37d1816ee2bd39158a650809c49ab2e0016f2d10026d622140ac4141f3fd8c8ae7d668c2e778b6258f617ad4334b2379c7c57829d87b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517a7308c3d90ec3fc46bd9a6426f8426
SHA1c7529b53cb3f9365cff95105798379fbf8fce02d
SHA256e0aada69873c4f5deaa679dfff93bc0df3331dc6785f767db02d1f035af4cc4a
SHA512eaf2f96a9db417064ff826b5f229e23cc692638570830192f5e75a3ae66e7c36fecf4b2a7941ab82dc7f18a9cf9a7c8ac7275fc145f2c1dfc075f076e7fbfdc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a280ec8e7aea30573fc5282dc099a3a
SHA1d5887422a4b845ca599ccba2232d8fb74419999d
SHA2566eb2812adc91ba068a7bdb3f7f9956799f35ba7538953503c7b8b086bf07944f
SHA5129a39065d279c5ffbad557f6b6efdbdecc3c1d57f07890d3d3bd8f8f60d66053b15632c1c767b8ddc814f9910f73c6c2591b5dde7ddc8116b41d78551072eecda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5549285f2b0b8823f253b4969b8d4305e
SHA1da252f08a059f8bbc60e336b4f41e08ee8bf7ca0
SHA2563f04a380f3b81ae6207be1a9dde399764ea4c12033dc5bbfddea1da508b79deb
SHA512a10095c6ac933d280fa8e4e9117a463f388b7dacdffa68eb19a587ecf58dd5696b75191794aaf1079b83a0196f6bb6f35ef6c8a9933a41a64b65bdabf9b2806f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b