Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
5c8692515d5cc02be0430716858dd7dd_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5c8692515d5cc02be0430716858dd7dd_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5c8692515d5cc02be0430716858dd7dd_JaffaCakes118.html
-
Size
16KB
-
MD5
5c8692515d5cc02be0430716858dd7dd
-
SHA1
cbbddee452a0fc809c078910255aa189edba1e91
-
SHA256
4cb6b9f76b531288fa017570c44e6e39b00de4872bfeffe67fd9d125a79a065c
-
SHA512
3041fb6e81783e0d5fd1f07c11da8857c49bf03e15bd567406e0f9bffcd3213b2eaa399de0f425b6b885e21e9f3df354ce27ed4cc738e721a85d03756f516828
-
SSDEEP
192:hMtC+mljavCneE7lYeo6yneAqrENnQ+vcBnj/nxnQ+v4aE8Qw6EnwM:hECVCM7lrwWCw6EwM
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000006ad3f38052f844e4d532b382c0862843d5d7dacd28b586bed3a1919a2a4ed12a000000000e800000000200002000000064111582424166cb053538627676a78f7d7312c25d683c45718a495e6cbc161e20000000a83b12e199c19ab855680fb17e5dc0952a5c9c2faecd6e4cfaea551e18a4746640000000064355d182173efce19760c4e407e0a4ed8e811278444e843155041cc0d1038a3513010cf5f7d3967c79abd41b0a52bf0925a916e89140bbe6cda81651cb593c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{28AAC661-45E3-11EF-B903-D22B03723C32} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427564609" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e5deffefd9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1596 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1596 iexplore.exe 1596 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2740 1596 iexplore.exe 30 PID 1596 wrote to memory of 2740 1596 iexplore.exe 30 PID 1596 wrote to memory of 2740 1596 iexplore.exe 30 PID 1596 wrote to memory of 2740 1596 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5c8692515d5cc02be0430716858dd7dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1596 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1cc7804c08c28b0df583ea31564a8c5
SHA1bc8b6a29deb8403b8bcef2f2b89b9a7898d0d692
SHA256f33ddcf38f84747d19e3bf10d1e014a85a63ea6606d5d953a467b906f1517b83
SHA512c77d667a20d030a10c3025d4ad82455d468603e2127bf7fd548f9118f362ac41bad2291dd197c0c21d01fa7fb46a418b56a0d9df187b079872efe61045aa6177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527f0aecd9eebcf22be11a4b0d752e42d
SHA176ad4e492df7bd0e15fcad5453d4203982a1b69a
SHA256271a9bbcccd4f72c90a592e8f28ddec56f7e83f5c7990a16e98de803b3e25c6d
SHA512ab180a6cbf0f038ba3da2a677561dfcc9392edd7da9d8084f3bacefa6b2f31dda56ff425d1663af95fcff34140bd06a38b2f90507da6750ba63824579abe3acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561e9adba34260d59b5b60b0d89fabecb
SHA178f383d863dcf8233b170656f1e8f0f8bb30f5b9
SHA2564fe78c1e5951d586ed61ee5d910daa375378a6d8670cdee4b0f21e3fb4147173
SHA512e4c413bb96b22d72b7974f91f34182191c67aeca04bfa413ba6bcd84718dbf9012667ee623ff3503d0652a64295421b89bd01162d7876b6da95a76431aaab6ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b8131c967a816b9f404c6deddc3280
SHA18060d841c7d271b8745bd1e454ed37d9ddf20912
SHA256bfe6a928dda13a7340158e3b007b01f734b23145e0be47a4fe2e3a72b7e0ed26
SHA512eb5ecb9ba785b274a7a6f61842806acdc17b3d99288bfce9ccf75d7ba6c127971e33a12ddd41d6b70778c67c6bd1a0ff1f5dc8857971f481e3c2f29007c719a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c5f31d802b2aa19dc39dfae76ec277f
SHA1beaf7074beaef4fedd849dc84d9af80379091c5e
SHA256bacd1cd1d5e12dbcc50749e007ab39ec2df3bd93f1e666f7257131aa8f5f0786
SHA512bc4f007ce45430ead1eef6cf2012e7ed0bcc1a5c86af4093da275c1d0a49858f83f4e776d2a0fa92e7ef2d92f01456500d4dff210023eb8b1ef37fd1f943adea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ada99ba4dd800a927a9a4dfc8ded82f
SHA14419a773590f87045faacf80dbf23cb5258fd6e6
SHA256e49c80e2d1b8b8f1418351d0a069df73b7399e5462df5554f2abfe69ff599f16
SHA512f185ee1eede2dd90c3c6cb20db67522bef7b56dc5a1ce15fe865baffb579db6846d59b74ae27dc397472bc7028e6b545bb4ded2a05c03ad6fbda2b7903dfa318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543bdd3465b54b936d93f2139764b9528
SHA1e97fcd77930c39161e519f372c563582b44a0d15
SHA256741de60f6a83b22e65c1da770ffdbb8e4b1d68562f9f7b6dd911aa6b9fb89f05
SHA512a6e566400ba36d5ab8b16f7d6ac6e85e296d2329a8a9e3d137585dd4683f1716e686b644f12624c55656bce3bc979ed73cbf07670dab73c912556f8ef0cbf17f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e54d228741d502e450219a7fcb57ca94
SHA10ae484b9cc70ea55b010e3b8ea0e3c57fc6f7451
SHA256f025beb882552c828776b8c13831a18e3646139a18a9b060e835bbea5c246041
SHA512544e812ba7359273e29ef53f59db607b2517cfa80e63643223427eefc3b6fc05224c39f6afd1c0e639db05a612bfa62e187b5172e4ef292ce6d35864757572dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576e843d9c85c0327bf66fce04d5fc834
SHA1521d1156462b810960c919e98ef247aec2d0c4bc
SHA2563a17600e8de1e6e9b6d3cb39fd98ebb21c400280d7737a8a2e66205369be1335
SHA51217195177a28ab33f7a8740a7f94c7e9e9e6ac6262f2f57f648d310f94bfb2f41e876ad57071b437dc9e5b75874815474672bc878df443d9d03e9e9a565e68065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3605d81ea540f600af7a82961c9141c
SHA13f2267a971bff5b7f3e6e34302f7f47a3893aa9f
SHA2569ccf81f16383c1fbb58a588560e5d3f00e5a28f3a92e378dd8201f29618e48d7
SHA51239d291c17bc00c194358c7f9dd26856186dc8000add8283762619e15fcc694a669a3a67ba6d4054ca3c00ceff43be52e4d8af6ca1de6d0212c3a66e5432d1a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f379c4aa322e5419334f8bbe2f9f078
SHA1184719ffed049a6e64aded55c4bbaf49595b07af
SHA256d7f0eedde724a423dbb6c0c154fcd02ff3302b2e0668d1fba12e3b1caf9b57de
SHA5123c8a4bcf933858d9da3fcd453cda025e097e5b45a6987fba4e1edab42de8fe685bfbafe45370a1ed1af7877fb2ebfdf01b4697eb0154dd7893314b6bebdbdb7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52047022a36f7f95f3e4574875a9562fb
SHA15e282a651f8dd613856d8a2eef8741b038957e49
SHA256faf2f6229b1329a8f95c3cc8c4c8e8ef4fac09bef4a6c7b8ecac4d2a545c2473
SHA512a2c95492671bda7c4f9a89aba400b3345316a1bba6ad1b957803ad6cc980ba6458882d1bd5d1290fe63d34bc31956e3186196baf551c6dff739010835a700b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ad74e85d0205b3aaa307efaf45ba647
SHA11f458128358415330fa6ecbbf8f20f6367bea3aa
SHA2567a16ef59bffca2aeb08fa8058af63c77e7c8809223cf7378bda54245f46dfe18
SHA5123c2510fd50348250a9a70b1bb7f2dc6b252273f5c46cb44c49f06d2a2e4a514ee09fd4a7d05d873e7ebe9561d245c1ddfad90d5b62b01eda0642fc9784b73b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ead8225fc74e1b2cfa0cc9181fd263a1
SHA17377ce7060123deed50d5252800ecc69bce74877
SHA256a69622abd74158828a8a5f78ef24e27c09df648684ec94e6dd0d70b7c4a53256
SHA512f23fcbfd50a8e01e4163fb77c36a2d284eea405022696e89c3c75d77e74865bf83202a3af41a320c864b533453453c9778065d70791b41d7c101239fe20eec5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5165204481e13a01c179357572c16718e
SHA1a917417e2bcd07a6ba902e77a4494688086ad5c8
SHA256763470e768f72dccd1d88431b5551f7f27697b255b4f802ae549fb362b763740
SHA5127c205544c15393a43e375b2f8233670022e14fe3b5b1a230ce5c4065d2ddfa7230695dafb9e902ac99554c4d60066d854346a5febfd2ed6bc34628eb042a0cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd986c422ca8ff955f90941772c96b30
SHA126439cc432cdf5fd9fc4eb4e7a7431509c4ce276
SHA256b521498c89e8ce31c0e0516a666ef75101c59a3c1a2c3fb05521eba1edcc5a9d
SHA512bb29829ad3695e4ce0c84deccc165327a0b7e6a8e2c4853b3a7bedef02acd171b61427d74847d2d9f497baa937c235b824559c89867f54e509cc402720c26c3c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b