Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
60634cd56c3469fe6811ef0ed60c61c5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
60634cd56c3469fe6811ef0ed60c61c5_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
60634cd56c3469fe6811ef0ed60c61c5_JaffaCakes118.html
-
Size
56KB
-
MD5
60634cd56c3469fe6811ef0ed60c61c5
-
SHA1
183f6398acfe474a80a5a2414a0c14444fe81964
-
SHA256
2eb669482cb4af2989065fa00c2585a120a2a1188d88971a0c75d42184aa3230
-
SHA512
bf4c11fc37748d2b45e85b34322f93ae5c1c67283259e3c231d83de77ad22a79a895ee370771c1f2ed25b93aaf03348a1f6c00cea5fb82d15babbcfdad22c61b
-
SSDEEP
1536:SqSIpzY2lmYC6zZ2wQzRDkFZWJRigGEFhH2csw:SqSKcYCVTzR6IigGQH2cF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E104921-46EE-11EF-B985-CA26F3F7E98A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000009a25e68382420a8a5e0caa8e26bcb238fa285cb4636225ea5a4ff349b52bded6000000000e80000000020000200000007d1b5fabfbe8b9061328916e01a020889a77c1e26337d0c6355e85a9fc23cc30200000004e0b29b5305fdfd28be33c9e83637db6d5bfac195c59ba57ad1e57456dbe938d400000008c607e35cc1edae240f673de29f446edc3df82def54e0037d2cc2c3136d774b39ed69bb973e787e066680a66f958ee8dbb53203d54b35f9967163f8b35c84f08 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427679427" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b1aa54fbdada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1648 1640 iexplore.exe 30 PID 1640 wrote to memory of 1648 1640 iexplore.exe 30 PID 1640 wrote to memory of 1648 1640 iexplore.exe 30 PID 1640 wrote to memory of 1648 1640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\60634cd56c3469fe6811ef0ed60c61c5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a922b3e65ca06c0809e766bcb3654ad6
SHA1f4c6c22630fa8b5a7a80188eb31be28ce86a05c3
SHA256c826d5ca56c290c8c6da5b4d8ca049c612872de93a467dcba720e4c7ee5bcd95
SHA512ef0109df6809295f7738dc5a92893733bc345702f76b216b54ab8d77ba85b3d966a434ae05aeba292668bf12401b8954b14741f8d11bcc5558b7f5c7f960d983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fc5d29be607e4ec1cb7263084b19135
SHA1075b6a9c876ce58203d84ebf34b8164cdfbe7488
SHA2567e7d6b09e3709f16b53bfd4b4d8e0a9afa800a0fd7cae9acd6f2f85e4c31efc8
SHA512b167c3eebecb407f5929d11e0fb1bab70cc5c38579d79818bdfd458ce9aed139ffdb4ded4d2fca5a7012b920a0cfbd75de849be8430814cdc3fb68a7afe199dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce9e243074e444bb4328697001388305
SHA1f1e1059ff98a53e6f8e014c7f6d97148414648d5
SHA256dab5f5a037cd48498cddb1ba00d0125762b8c715a3af94a574507480a34a4558
SHA5128b7a4eb85a110cd17ef6899569b861784552d82c1f0ec23915a1b78c15cfa520cf67a609cce3fdcb6acc57402339a05f4a4783ec8ee8a8a443bd2a8f4a026752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528edb5f764be6d0611f0fe66754a5991
SHA15aa0692caceb6781f2b3c15e50bc54822371635f
SHA25688129f9100aee80b7e27eb6d010b75d6b320601f8a598bd8270f92e801c61cbd
SHA512117af4ac8708884ba340205f5271b45ca7a35ee0658e3a53b640373c8e03e0a5987f3b5a5cab00316d5ffa2823009a5baf75d784441c593d446a452cead68207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b80bf4239cf7a217bf7335486c873b2c
SHA18b3bd37672ca119a48b44e5eb63b84d1510ee375
SHA256ad3be868437b8f15b4c049b1b9cbfa0489c6a2a14540af6317e8c0b7740cc75f
SHA51221f1a3eeca850e364ef1f83baa1d5d1d39dd14747a4fa2764a4b5a532883020d97c058a9fc690e9d4c0390b99bc54069b4e6a0e2467b03e983af7e45cab68227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecfaf79fa8c19abf69d444ccb05b2ca3
SHA164bf045d9ea19062fa50699d5931a8622de7b00e
SHA25681bee3678d6c9df710826a181758e99d5f568a390f00f7098c35d6f16e9cd3fe
SHA512b9f6684907e88a7b4fff20ce0155e993833c90e3d165416b18044a67f012eb09caa25c7e932910f813ed794930840e67e55441efca9015f1dbce079b55d85ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52742e92d35dab864e1e270ca3d0d78c4
SHA13ad2d0938ff57ed4eacf89de07d3b6328a712fa0
SHA256022393d02812e378fda594dc523eecd3c94af110cf31c4a8031daa35d57c75a6
SHA512806e8a5c85cfa5b71977dd2c29bb13815cb08446fea5b236eef67e7a3a52fcb50344a239e4a09df2bf21a9e821ef97ef475731a6e2b4c0a9c82fb10c8b797617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9a39740e6ce6b01851a1aecf4d801a4
SHA1aa9882e760e35b0c0b03b1422d5f5305914dce94
SHA25655b97e853634788a49e15670715986a90ba9f53d540d6ba0e790f836dce7d5df
SHA512088a1b9a3ba78cd43a91c2820c83769b990940a7a4188203a354dcce86a68c4cb697a701c752c03932eb0fde61208fab36bf2dd5c3430ec5f44efcf629090def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f55939a24159a4dbf690f70edad75f3b
SHA1bf600408fbb60d784169a6a67c567a661c5e4566
SHA256fadee4d56d4c9795b340e904a5de5d5ff1afb09f480bce5a31a6dec2c74cf868
SHA512b1644523da0481fa4f493b452fee4f36672c609ed8a46b01194d4e892a9f0787d06709569c8cc8481883b364c1553e3da24b72393a4c9907e1e491fe3c252478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539720d10d1d4b72338111ca5596e38d7
SHA10b065197810bf77819ab18d0eaa3826428d1961a
SHA256c4c627504ac06e2b110269c7f668972f87ddafe5cbffcf2cba15e39efa49ec7c
SHA5124a1907d819fef29168134ab484f1c321bf4e6d36674d5fdedd8ba15811a9367854de7dfb67740c3257f4571bf95773b33809c0d18a96f1dea94dde6795bcebce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cf92a1f3e4c895a829ce7b1bc0c309d
SHA18c0e82cd88e03fedfae4c7f34201ae53fb6301fb
SHA2564bc0c2627ca0a5baa9c83c57ed636e5b8825c083c277bfe154d29666d22463d5
SHA512627a378a57a06ef4b1312bf1fef72df13f0a52ee5da15683381c8f58bd4b3df61462e57b3218491889615249c047e2eff89e7635c05f74efb4f907b2f660faf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db178275297d29c11695b3708d20c05f
SHA100e8a7a3882de7c3fa6ecf1e65ace53f881a3158
SHA25670b4a8d64b1975b969be8e138db3ea4f365f2a753d408163a99c8d4244043432
SHA512f8cd21af2dee823fe24dddf42d5de146c6447da75e78ce35409ed699a3b9a5a6fa89b2a9acd897898ea3f4d82663d1e9413cc4a5aca4bded8df086c3c2bbb061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57271ea39371c1fd8900b41c726cc2bb6
SHA19413b309783757e931fb85092595979c9cc2a979
SHA2569dfcc2d5d88a2f1db35698c7ae3d9545a0338443664665712bd6f9b9ad3f921a
SHA512114d4c6054cc734e267fa5e8501d5256365bc46e149e3ba901d26b3d72387901c6a95df046a6d7321e84934d2c56217d08fb4a637f51335ea290f4af54253a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e4e8620296f379bf00e11bf2c38f26
SHA1f12752ea414d44147e9ca59e0a2c40c9d9a30af7
SHA2568037f23dd8afc16c85aaf83b214cca0f6f9ca5fab3e75ebb31f4cba8dd35fa25
SHA5124b3468d2f73feda0dae1d9bf59ef8e88775aaba854e8a50463e8d0a809f53b0dd4462ce8c6fd2b07f781c5c4fa962d69b104a750daa5d524c5350681d80853be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53411a5eddbff16e1585a4814cf9cde85
SHA150d77043d1cbf726ccaa3230ef2dc12cd547a06e
SHA256fbb295dff64d6eaf36c73dafe1021551d269882f772969caa1037de6b155fa8b
SHA51272db02c701804f0bb298a0705e1eaa25395888c760e7828dd0386b81c68b99f88f5781942bcdf7aabb70cf3f858ab0f60db8681a4d27e532cf9812d4aa9c3712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557070e62eb581fcbc1e4a30c376da6f1
SHA1e471e14204224ed0d5b18db8e870e7358a6cba7e
SHA25620d4ccf747612bdbd277ad3ddf1ce0d56b2cc3517fb9ef65686fdb6e3106e8b6
SHA512925110a152b9c3478870900b37f239be0d0b8f1a31a4b82b6890f0c86accf1bdff1425f9ce599d71edb36a7be3d22e48fc8f577b0fa42c555ade484284a15a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5190e30e9c591551157f3d447fabe05d5
SHA135230d23ae1b02f5d7e6dd515d76021bfbfcaa0a
SHA256a07b35209202b6053ba26302f924b7b32ed9f882960971aaeb64cf265db47f16
SHA512ee8fa8f5b8c2ef9c9a5cb16b35cf5a08e4a318d2ff8de655b0128aba9a1e3a9b3e7a06ca0a4b934a04956d960e04ab0cd8e9945054425b31fff7ff0895a0cd2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b0729184ceb9700b919f099392edd13
SHA1c473552ab2dbee13784952296e066cb87aeae3a9
SHA2566931ffcb67ffbf24756c1b75a38ba785c30196c99637ba0d0f4f14993051cdc7
SHA51247df25babd24bbefd3ef028739d9c9129a0da869d88af559bb6c17dcfd8d9cc6cbdb08399c2ed77124dc129ae34efb3f4306fdbdad13f0c530fe14e0052e0401
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b