Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
72s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
59e1e9b9f30d673427d218e910597056_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
59e1e9b9f30d673427d218e910597056_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
59e1e9b9f30d673427d218e910597056_JaffaCakes118.html
-
Size
35KB
-
MD5
59e1e9b9f30d673427d218e910597056
-
SHA1
d5150fa95ddfbe1228f942b9edfe71fd45186cf5
-
SHA256
13d59f3072f6acc3d04d1e51889bebb8e11a94ee1caf0d66fd115da94e65fa3a
-
SHA512
23152294749211b2736582c1f21132dd0e7a33a57b442e4d1ccde4d8af1775b0a5922d06db2554091fe190e249bf1ff1afd213ff5e37fdc019b568204ca45c35
-
SSDEEP
384:9MxTtoeBssdbWWGzjCNvxvRc98RWIehVa668:yxmeesJvy6vR88re/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427513915" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000e28df5f757b76854b91df2bb594e21e9854cc4add840715b6970d9d29c5fd15e000000000e800000000200002000000083c814246e826b12af1516bc2d87841b22f868a72e29576272fc163818a2e6f220000000b9a8e67bd33043b940a89820a7f181ba2102a4a1fcf48a10ebde7b686a71482440000000c804ef1de826d4ccdbb45c17ac6ff24d04c012c259d6bef1d4886515b2ff8a4e9d98ead0f0d806607d1a5e1ddbdd5ed4139c98f5d9670265e91ae82b14a819ed iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000324769d89e996c8b6e4173b3ba0c92e2c19d6bcf3d7870836aa41ae921214f45000000000e8000000002000020000000137acc216a783d861ef5f11647e9f326af878437c2e4ddf31fdae299660cf4769000000092a111fd9f2ef5637ce3c376adf6555f134fadbe6b0d8828c12e60d61f51ee8f1ce55e148a4216a440ea1cb68e8963c6aa68c10bd6c14a5be1ddb1522f9724559e843d4158f45c29b45c0e15f7926a8e98e4762d0ffc6c4b65aa1883549d5a299ccaef700a5ff676faab20930bf4294c6f1c7419c56f4138550040b7f52713fc88de7c089613c51647f07c29be3cbf524000000055bfad4798404b3651e53444722051a261ec511b265a6adbd34f74d053eff43d64a6cec1989011cb49b97c12349d434c1ecdcc8efd3c1b836c05d5a8d244a0bd iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0b462ff79d9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{20A67B61-456D-11EF-A839-E6BAD4272658} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2440 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3060 iexplore.exe 3060 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2440 3060 iexplore.exe 30 PID 3060 wrote to memory of 2440 3060 iexplore.exe 30 PID 3060 wrote to memory of 2440 3060 iexplore.exe 30 PID 3060 wrote to memory of 2440 3060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\59e1e9b9f30d673427d218e910597056_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3060 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d6cd4dfa886426d1e5ca0b4e3971ad
SHA14fd0a0caf8189eaeb625d06135bc964c688897b1
SHA256feddaa86ea618c1fb52c381b49e5f8173a48d13a1ba29218a38ec3b22f947ee0
SHA5120ad59517db7072ed1c7d1657783ac7eaca03230f4b86bde157356517e1710853aad877c1399bf523217319df1638a9f060922951808f215ac90bfd4da66c2c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6741725a1fe3937ff50b5cd2c399e60
SHA1db6efe46a049a5bd9f1b81a1ce8bce11e2e675f1
SHA2564ef38412421e07cfe188e28aa967c83ef651c9908a7de2ceb6a925c7da21ccf9
SHA5124436073dda224b283e2c034755a0313660fb2a796d7a4f1c06d31d84926a1d0c2881686d597fcabd0df5f32ee63b92706de66e04ebdc56fb0bc4a24462da5748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577ba03dfbd3bb54ae1adf2551735c579
SHA16d84d64cfe5fa08e790573f7d31f314ec6c429b8
SHA25623bcff587686b1fdf241db6b77fdb4f9385cd853bcb98e42339afb9d259bfbb3
SHA512ce81d636f71ecfcef0c809a408f266abca5b7c3a21ccc0e7bd110dd1dee71bc6b17458c7ce054d34465429d3ca8937a61733905aba01cf9ec151d7de2ae3acd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ac8ae9bfaf6d8b975b0a4c7c1e836a
SHA161d98e3380dee3195b4ec05fe4ad87b4a4db9de0
SHA256417efee2adf2fafdfdee11656179d99f4ed6c1035dc6de3d48d27c27cb575426
SHA512410e701893aba30d0c8ae4d118b2aa8fc5285f86e15aa9f3ef70145c4fa98d715302229a2a51e6b7ffd1e34722eb5e1b6830fd016e274971df2253e1cb8c6d4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504548c24990c1869c04c49ff1964aec8
SHA17f7be5f1c420f940e0266d390ea5702a5e28d2ae
SHA25662604e9fdd7b1fee79457607de244b96235cb450dab263ed7c55bfb7cfc26728
SHA512b2559ac7459ad4c3ed85feddeb8e15371f86afd7050f480fa2e6d8efbe204a791d7ee67c4c0ac029718b224b297d1b9007ff5e0909ec8db73aa3ddd4f68ecad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bb6ba9672b196d0c5d2a7df904fd516
SHA1ede7bb2041104719c81364cce78d0a6d98dfdce2
SHA2561003560380c41aa5e0a073e02c90990a07829a32cb2f77814328987472412347
SHA512855b2620d877f057ed95d568aa26adf28b171e383abb929ca05285f11a1fb6c4164d5a58b94d5385e733cb5492ae1a964a44e7d7b7db45037ecbb0416debb5eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d424e7c470476abd545928d07d0d3d98
SHA1360811326a8bd714c2290d7177b362aa7476cb5f
SHA2562d117f64cd4507db1752c88e8408a019ddc3a808fff63ba38467d43b9b1a08cc
SHA512397be5cc2bda9dff53b10ec0baa783acb446c8688c48f32944d5a4ea626f31ec145d8ebb793ef9a7c8fddad049aac69de4837622191a4dd65c52001a7f596d87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be04fb6a738a1b9e41d0a8486aaee598
SHA151a30c42a3b078ef9db12905143c84cfb75fb6d0
SHA2568e73147a785d381ccd3f3f89329f2ab9458bcc16e9a22107ebb444ecee379882
SHA5128f661ed7cb439a9a9a6c9922bbf7dd947af2778d59aa2c181c082e29ee5a125f56cc97b13c0a3d7c39feb379bfc72de0e4d538998216ee440f0b80cb73396146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532caad7eb6c086d940e6cdab7b5a770c
SHA102883109ab7a2172a076d8bbf471a253700c5544
SHA256c8c82402750eef8f607fb0f35d37c4aba66dfabc52db11e2dc8ab4d894967c04
SHA5122dafd56eb3a99f7bace01e62178de93e65a75f866f480702d28c8fcf2230e376ad9bce0419275dcf916d1d087dad6be6e3fb4fa483931b577d6a6b5a1de3182a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506210b32fda0be6383c853d600409901
SHA1d237f58e6ba1ba12bc8ccf00da7d1e516c3ae596
SHA256b95679870f06f4d8c88dbb6c393867fea7d2e47bf0876d14ccbb011bccf8dfc3
SHA512b0ac70fa71d812e813a99a135fad0aeff6171850462a2052e6154a36f054ac2dd5d84b925d9084bc59d5e30724f8731a7fc702d9ff24028c42eacb5186081e85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cd11837e9267b21b6c7d5140c9b50f4
SHA184f16ac9feac54c3258e5d5d374bf85147143c0c
SHA2568269d162b6a57f003aaa7bae09e7cdc02cd0c80066088e71b0f3f4c3b078854c
SHA512749c620968c88824057f3a013b2fb44e2d90df2e4d8f7cef43d231059d0e466241dcf4f185bb52dc21962597148df4c6037a35033d1bd73d8c7d05f38953b340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ffc1b86522c515b76ff8d6b5f284258
SHA1529278dd4dc9362fc5b80538070860559480f585
SHA256f81b951a4916e45b9f4c0b39751ce0d0dd91d815bd22240bd27e78177f1d7b10
SHA512251364e2cd42033345d0aa507d826507146467af897940fc2b3ffacf54bd5ff68eb72778dd136d81407c5eb5182edf8baf87ef0ddc3feee8fe8481336e0843aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3cd39c263721c5478f18e3b7269b760
SHA1cbbf3443bcde0d84c9dec35bcec4d752cffd99e5
SHA256093e2036616549fc8cc6120cbd135169ad3e7cc8b757ca994386799dde2e8823
SHA51207ba5a1bd7c75c330622da6acf0d9a2603f7f2b1ed5226885c2f096897976328c842d333b26cf7ced862729fe8d8111ebe9e2d111a9b7e6a8ff20b655340cd65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0bff2b0efb4adefda2b1896c2e49f16
SHA18b8aea3b280719162f3776b39445eff33268c61b
SHA256572d33d73daf34239b1bf3de1c0dca33de06450bf8ecca2d906ade077ff504dc
SHA5125aaed3d819da37890f2f9681cd3a6f07eecc42a73a96f1cb05801d18bb99c380b25ef66581473dfbc9b27ee25b38c5c94230aea201010cf61f7565ccd1f2319a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578916023327472be90afd52ef8498c0b
SHA12b4427414dda6555b796936c6bfc2f2fe33639c3
SHA2565294b03d86366f9beab262b3e5056afcbb3c4f92badd1721faa508c7bd6cebb9
SHA512099f6918d717c7c9c780db94f725362c139e56cf11108dda2fd616d84d44eb579782469eec5786fd853ca2e72414c39abf5805ab8779e28990ad9a9bf3f19474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5406a0f503d746c0d723bcee7d97bdfbc
SHA1d4c0c3387046ee94019790e700c507ca926ebfc7
SHA256db7c7c53567310e39eb13720d92a355439dea8a310fdf01d4e9310803b9af5b0
SHA5122c3fed2c1431d8c220e3c1ba6c2ef39730abcfe3fedba72bc0f302fba697aabd9dd1bb5f9127215c86db56bec6e43391aee6d2b7fa26aca0587ca3d0d6032a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e9d5609825b5a8952d9fc897edccd2f
SHA18b0380341ee05cad41bcdcf2c7c4d5f815404371
SHA256a16cca07f1ed983149c326443fa89997d80dc90ea0c1482d310f6466087db6a2
SHA51284012b4f056fb37bf7140c877c0cc86610eed1a1b6e4759432e858b705a6cf45df20c402b719ff291bc3ee0a3d0e6bd9ad545ac3eda608f63661da320854927c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500ad5c0bb1d12e22eb1ce8fcc7579711
SHA1af821982757e0f2b2b1e2f87f6d42886160c56d9
SHA256ecea614a3bdd58156b6990a0b6ce01309f7e67cd2e0c41e4ade125ae3be2be9c
SHA51273e3097fe58d254a4c3760b8e2dece7b6dfcfd1ed3524e0d7cde0bd1d09b7376709de0da26d916d249b572ac04d1ec9fb6df11e0a8b148a5ac489a0437e377f4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b