Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
59fd337d96761581faa6c37bcc7fdcaf_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
59fd337d96761581faa6c37bcc7fdcaf_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
59fd337d96761581faa6c37bcc7fdcaf_JaffaCakes118.html
-
Size
3KB
-
MD5
59fd337d96761581faa6c37bcc7fdcaf
-
SHA1
058abd061c3d3f7dd2c95400c3aeb6eec8760bb8
-
SHA256
1b173fcf5b8ac1e2cbb9b121129a4f14afb7972a291ebff392f71e7f0b8a0fc6
-
SHA512
c7e095748b8a69b98b0d74f96ce381b42ea0480f2a6d83816954472a41dd0d5339f6946b43ad6a9966dd989ea6f1d204a6730d71ed06236bce945fbd67fbc2d5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427515718" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{534C77A1-4571-11EF-BCF9-7EBFE1D0DDB4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000158e399f6d17e12380a209bf20097f90ef47813d66ab83aba2234696240a3269000000000e800000000200002000000057e507a7e4e377548c416a384fc92e5ce0f313a78e97c426888bff300476b5e120000000e30292bd515768e9b5890f42ae0aeaf0fbea49d7acc90d92fe2335ec4bdf4633400000009021ae77ccfb2971402a3917c1e59e058e4bb9882f1ce3473f65c29c851527dd06290403e91abc1fb4292c456ad6e288b9a0aa17c100bf058278e241e9bb3d1e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9076c5277ed9da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2656 2672 iexplore.exe 31 PID 2672 wrote to memory of 2656 2672 iexplore.exe 31 PID 2672 wrote to memory of 2656 2672 iexplore.exe 31 PID 2672 wrote to memory of 2656 2672 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\59fd337d96761581faa6c37bcc7fdcaf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5176dba6ff06528c80703c75270c916b7
SHA13224dffdb4954436bd383565cfde79a7045dd386
SHA25677cc4da7c177762580e74516cca6c8ed2b07ffac5bfb618a3f8dae7029a40315
SHA512c00b432be2a75c8f81b146f863c2037a4df14d55778801319db9b6e6a1fb26363cb4eab5f7e0d1d9f74acb82abac7a23e4a9da9298c8297438986b4e5cedb7bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5318182ba6b31841c22a86edbb343c1d7
SHA111e8c55e3485e0266ac101ec97f2f5733fe7edfb
SHA2561f9c007aa638333a2560c222f56ea364895d2ef0e7725925e1a3a0d899b436a3
SHA512c57052b23b7b0beaedee77e7b8675ff62d6a2f02411ee68f5984db8065086bdf192c17f7c630f4a159652f6ea3456f6cb1737c4354467d8498a9ed6d0dff120b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e475da02c2131efcc3b23ee3b5e316f8
SHA17a531d4e2c05b6bfdbb752be722cdc6baca03852
SHA25653e7ca74d2c59a78d6fe5ed22b4add10a92437d1fa12acaef623472d516619ad
SHA512c41edd1de729be8374a9a1bab819119d4e72b95086701fd3cc15d2fe6b52956a7522e4e74a64385efc8f26a77d67474a4effe001387be791bc4d8f9d2dba230c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ff903540ec13c374f5278a3a0f3c5a4
SHA10f7082b0ecaab0313b398a95ddd9fbc3028ed5ed
SHA256d02628737eb21544fb2d053cdcfc238deb37f15c48ebc20fd68011bce151d6f7
SHA51241af00f53c249f6dcc42b2a3807ddcaf679854844beb2147525029af969f3cd0197f834aa4a1461686780e8c7f103b10afd19ab03814e7dc963ff18f479e5483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c610fc4c684379bf4792880c861e79f5
SHA15a53ac88beaa932ef3ed10a5a83227f239897871
SHA256d2e99a95d548889d171ab050512d05cb8d81c37930fd29cab51b8dace9f43d8f
SHA51238242ebb663b724ec869624c5955a2fe54399cbd8f1ae771576e4305a629d43a51ff79fa3c056b98522fbbccaf3dc71169642fa869cc9784229308347810c7b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c2973ef8e6c54af13cc65d99f0e3568
SHA12a735875f6db0e665b5d3aebc763edbf4fcd7db8
SHA25622ab2708189496027fa35eb28692cbab84a691f48a524799a5d2458f97400cdc
SHA51238da3132a2b74e370cf74e2573d2cfb5f9167f29017bd41cbe325d67cfd561301ee4c099744399ebcdfca79ebf9335bfc6a809a57becab195062e3eee19b871d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534f68200e6dcd2e05880a13baa10f64e
SHA151d4771896f487a2c3c8d3ee83393f35c7ce04cf
SHA256ba72239e71d7ba5fbef08c1f2e647a6b7023c2150af2d1cbce913d946663f23e
SHA5124085e0c3f4087b641442fb2344fb189a95763ad31b0ad7a8c99edd4021fd1623e6fb8fe1f8d4c109f4bff078093cf1afd923fef1f3cad2f40ce8084bee2214f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ea430d0c4a4b176a8dd4dfb0e325c7f
SHA168d29a0c414242d3ac8f3e27a0136b9bb38c6b4c
SHA256ce64ff65be7caa27a6b9d1ec86a58bc76e239048d8cff2185c9a212a4dcb62cf
SHA5122333126977728810ce724f80e932e9daea3670573ee9e4d8fecafd78cc22edf17c8af7a01cbb7dc2e9b968720ce7c75463bdf89b778f7346f2072d556ed92712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2a18750fdef6b7f60cc5febbe1f55a6
SHA1811311dcdb002c2d286ea692e720976c66e32a54
SHA256dffb249e211a6e4d297a4a62dec7193d9276543509661bd1b89bc23f4521a0ec
SHA512d3f46c2f9ba5c00de15daf9cb5846516ae565632771448ee42479254b95ef9fdf630cefb52511be13b682c76cbde1b8f963b89f4025ae26f2ec2ebb56e37e62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577967cc8134cba5f7154decd5308a607
SHA19a7d21e0b6e83bdcaa5979d39f1527c78821893b
SHA25652e22239d13fa69fae6aeec716613756415125251121d5c78ecd6f663e591eaf
SHA512e04070cb3094b5d1cce3cd99bf46d8ee86f641da6f0e2bf82ee49c767fe59049587cf39194bd57da4f71633617dbd4e90dbdf0e5f4fff846467df896dda10ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e5ec58ea505274b02e92315819eb41b
SHA1782ba0dde5bc17181c25cd810c3e74a893700f63
SHA2562296e09e2ff8e3e6a65a4a5b85b8737b9e51fd7c043cbc41ab5b17396aad0b9f
SHA5122c4344ba3e1f7c0c8771403558a1b4013fb5ddcac2a085b88da09b460c73229eba3392f8f43c633e3e2c7b68b0b7c3c261dee90f5746daa5ace1a41ce33c1cbd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b