Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 08:40
Static task
static1
Behavioral task
behavioral1
Sample
4d9331f9090faee6c3e7011a6aa867e3_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4d9331f9090faee6c3e7011a6aa867e3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4d9331f9090faee6c3e7011a6aa867e3_JaffaCakes118.html
-
Size
17KB
-
MD5
4d9331f9090faee6c3e7011a6aa867e3
-
SHA1
1a449af305cff71297455ff57257655030add639
-
SHA256
406d9fcdb99803d61cbfc9cc1113819919179fc18354941f5692730e1a9a6ce9
-
SHA512
1e4f28d261ca69293114cfd4fd1ee695f347f5d4b99b57ba24a8f9b0ff7f01b5730b3b28722f6fa2ccefae9cfee02e5cba2907ed1f694877d8d6b3817ad6817d
-
SSDEEP
384:B1BjemH4yhzc5Ss8NgN4ub0y/RiLAgOrrzMU1y:I5Ss8NgN4ub0y/RiQrrQUo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D2B3901-434F-11EF-9143-F235D470040A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427281122" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000e48c186e5eeb79910107cf8556dac8d30b6d278161b07e94e3ef0c9d18d3ce96000000000e80000000020000200000003afd49bd058718b9ea021d477233ef14da7794196a3baf5d7ed96a87c18bfa9f20000000a9eb8d36157866b27bc53e08eab3fbcd9c904a8a765a0461dc29b2abe6ca7a3c40000000e73f03995503bc2d596738c885e6b875ca61436d682c88501855cdb062f28b5e68129992faf3b84788385d54f9fbd4f67bf38c9c3867caa531c21d0ad3ce12b3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e041620c5cd7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2676 2072 iexplore.exe 30 PID 2072 wrote to memory of 2676 2072 iexplore.exe 30 PID 2072 wrote to memory of 2676 2072 iexplore.exe 30 PID 2072 wrote to memory of 2676 2072 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4d9331f9090faee6c3e7011a6aa867e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50542b748aa02236f5450a1799a17957f
SHA1f6993b58cfff0b8d17c6c44be385cc43e2cb9141
SHA256b62d8b5fdb315684821747fb3c0fd105c7d15e6206d5a9b1eff94ca59ad78335
SHA51207c8f90ecb5d3761575244a0de6eea8df49619615d4475fbc78f13a7f54856fc0790a5a4d00c81f0da18092488ffc5058cdacf9474ad5757a56b1918d4c6e10f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e29ddaa6517ed8c67f2960a75aded2
SHA12fa78593755731bc298c2841b2503da240510968
SHA2565abd32d2ce625d2269ca0903e2f7e48a3b9fdc96281813adcc7746465f199ae7
SHA512b2c74e2d34af5df84ac6f35810b5e34e17a52ba0a00a888c7649a5dc5a7e2573c634b2d5f60ff45f9aaddea5044ad9b8871944b2436172e54001c364e88bc64b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c224613774ad82aea2ed95bc4d3f6a1
SHA1965e145f387bb699f3b81ec8c5623f82721fa68a
SHA256e0e1817130a8e51048af4c81a0c92749e36ae298c9ca9c7d265878fee5130552
SHA512fbcd179fa67c6d1303bc1e3e781890f5b91e133298b92921273d359af98a33dd3a66d5e917f3b2d99bed42e159d072472609c95945da53b5f8efc3123c6ad5f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5276cdc3f06a2e9863d49a85f08893d01
SHA1ddb1266a1200d029317b53f22cd43f0afeaa2565
SHA25627ad65f790fc5083337cb3672685bcd74fe89fc4c5c5bf2030996e63a6f18aab
SHA512614a2d0bec65b3d2c9a1af0f9572acbb7be65fd78628da5c0baa8dbe9e97e2bddb853ed8fc948b930aa2847772e1c77baa1a6d9da275703febbdd5a1610e6c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f343b2d21e47b1e75437195695b2dcea
SHA17da92c7edd1073a98c1982ffe9c3126016af5497
SHA256d177843f52f7dd7436096757fd3ab18e3799d22d5b548112a37ee5bcf63c74eb
SHA512ec04f68a348440157370b7480a988f44e184d0fdac563c44ac334c243d45be215d52b1953d11e76df36217687c8d14db01b4fc97352c6a0cf6c97fae11e38c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563c290254e947377c78a59497d3f4168
SHA145f227fff86a8baa5092a94c8be6e0147fc59f45
SHA2569d230a9e3695becd08f2b8c4897888b66620fc7b90bba0997ffa4340fd371f73
SHA5124cc5371df59152105bd3b4e23582951cf25bb382c5525fd17946dc12f0c0b5f94c7c9f8e731c7b513853f1f57f9821e85a886aa5883236833f779736976c3d93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a0772d65bcf1266613178a66e0292b7
SHA1743736ac75914a078da1660a5d0648395d1a3a77
SHA256b82caca96916346246e068d02dd9704463725ef4f9ce53f35e367c4e0f699d49
SHA512234ade170a42e48c7d5d16e448bdfd7ed44f8410ff79d418072e4da9a6ce178134cd6de6ee7af4b1dc91bba397df19a5e5da9d65bad7b479a94645a5adcae914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5075f9ad0c31afb8ac5a92f8818482360
SHA1c1ae7c8d9b729558453429eeefaf171a913d42a9
SHA256373a1be0f347aa91982fa49fd579c7d87cc9349bd2e9eabc7e1096a4fc32e433
SHA512fa2794df69e66b4195b3a1670cf09a44858ffe1ac3c83fdd151cbaee5feec78680a9b601b57c60febdabbb92cadfa3972e330d21aa133516e981528985317291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c7ba3b7353fef15c8f5b9c88b220dc4
SHA1f7710d8e74a30c3d5d97509e28c0dc9a1b690ec1
SHA256d1a6bf8b56b26ee117bf37629dae8033a4b813eb8844727fd4485865411097a1
SHA5122fd0447fbfa376664f5c9a7f90953d4aa5c5447773d71bf1c418f3e017646131b479048a356cb7073676775f88b813f9f0c6dd7aa6e56f6f84360ead45df9e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9c8e1f8f5d5985630be65ff25bf422c
SHA1445e82778df4873b7ebec4f512d68e67af230414
SHA2564b619bbbff9f2590c0ab756734d06fff7ba3e510a62450c932cc14baf4df7b97
SHA512e9f2d7afb79ea34a272cc653bda6e8c0214c0992fa2b9dca31461bb0ffb4e72c18f3d2184b850fb584358c56a5b6a5251a539981103bbbe40c80390208933426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530c3890740c3aed69fad58d53511df9f
SHA1050068e6a7a47a35f3d28e3cfcd190056bb4b0eb
SHA256391ebe7965b931c78d1db2dabfb2aae8217afbe4cf720e7e490a45e3b22eae9a
SHA512f3088280b1d9806a72e7e65d7f07d2e82b1fb00ded7c8bcaf62ea29023c4a8f39bf5e0c3da754a084a669ec6552c173ef86db3f566a8625c09b9fd63de52a543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f83ed74979604f72820e1efdbabedf8
SHA1efc7540fd9b5fae72d8072824bda93d9d7d3f6db
SHA256f4d00f12c1373964d360d4166b6332450da5ea4a3c78c11fa4e7d01913dd495d
SHA512370196c86c546f6a88a0ff94fddb0d879a992a6080df200c309d9babb370bf2eeabf2e5ab895aab4354ad52a4ef486335e2cd28916e38a7ec41a5c03fa597ee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a43d09f0b673bef4a5a5161b777c08d0
SHA1752b569f5d73af4bdaea23d83d3be18deaac84b4
SHA256792f43a6f1a4a78850d4e19dfdb9f975687f6a07f883c9d9ad71276a44f898e6
SHA5121b6e63b3017ef9967b3d9942e3dd056b7ac46d423ce32c13906a796650d6dc6565ee090f066b2fe5defe8341d7dd4aa8551dced86f537ce86aeeda66cc445486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e109ce4d9589829f83cc6bda8ac9fe69
SHA19e431bfaefbfbc4843751df7b17ed49379b4973f
SHA256a778aa1dc75773bb58cada5dc86edc3839ff195e1363dfb844063efea8b31c89
SHA512bcc27697587e6701eafeaf5cdb1045d732f58bd2fcf649009948cf1110cddea9bf49fe978a9bfc4ca2700540fcd39f75694025636dce93cf7bbea27723809c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bfb4f29b83e543d585defe566de3389
SHA17692a623430362848c563cfe223347be718a23a5
SHA2569dfff3700ddd76b93bdaa7e0950ae061b0b5a457fc8e01fbcc64327d6b3e7a93
SHA512d89209f752f17433e30cd7fcc5028284b7a9eef679e17d1d6eb878380d38560bb1437534793aae88d7c6f97daee7954bcb9fb9700cc28c1c0ff613e572e3e0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5efc0e1daf0484d5dbdba450a50ce4f
SHA133599e4bb919fda0ac8db0623c4b0697c6bf33b1
SHA256ce2c2a1056b17a6a32381e1d054359df628d2b2d7ed6ba8ca592d60139bd7e87
SHA512847be277b00a1ad3c1ec0cbf698ba35eaf51ddb2af2c03e327b389a6437b1a75a301059981abd898292b45248c708f4dca3156e7db1e55deeef55c95f432b6f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c5513c9f0f4f5c1af64770b95fe89d6
SHA11bc100e7aabfb49696239e4e16d4d227267496d8
SHA2563831d0622a683a5eaa2683182f91408c17f482c446aebeea485db53db0902e97
SHA512ff0e9b35e5028f9688824b59a7a591cbc76365e682428997f8f65e6597d7a5e5cb5e22d809b95489dc2d48c04eb3af537cb04052035966a76447833e122b5b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b98d23a124e0fcc6dcfae10f251f2f
SHA12a9e3fb006b761716aa7ecdc4f2d3e8f223e5ac4
SHA2569ec59ef2bc7b68701f3d41142f9b320250452c8cb5629def6029a0a11110c0ab
SHA512330046cad8f1990a3cd8eb9f316bb6d28c248719fcf77789a850198369660592da7bc4545d98f204aaf99e8f5064c7db74b3cc74f8b21c798116b29c2dfb1a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0e1ef93b561e6044bc3801013d096ca
SHA157e943223ee7e765d788ce0e759ac3a5d281be14
SHA25629f9c6b771a7b877f4e61883619729bfa572b7462e37c8ddde265b121fae6bff
SHA512c5f45d96f1a204c0e13ef511c16c8cf8f99b4d545ebaf42b3a89018f0ee9790cde9b3f5a90e1663c6abb48126c9ad24a820a4e76789a38c903dcdea1979ec12e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b