Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 01:06
Static task
static1
Behavioral task
behavioral1
Sample
5e7117b122058c13f926305fc4f9d042_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5e7117b122058c13f926305fc4f9d042_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5e7117b122058c13f926305fc4f9d042_JaffaCakes118.html
-
Size
13KB
-
MD5
5e7117b122058c13f926305fc4f9d042
-
SHA1
6f8bff7b1997881ad94ae20846f35da68d984bfa
-
SHA256
1df4393dedd51a90b02ddbd39f6d88c4f0189d337562cae7f8a94f11ac7a7e6a
-
SHA512
95613c34ed8ecae6508ccf16f541f2cd1074a9ce57f214941b1f799872b7af6720b367dea8f4f1ec39e8fb824153b4fd043830b1f5037d3178e96e1992d7228c
-
SSDEEP
384:6VdEb6fwiMLX/u5u1uNXVmfMV+GLpsyXvDZspC4tn9Om05963vWcmAkLzd95krr7:Mfn0+0pjfD
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000004c9b226a8a83599b5fdb2d8493257eea150956c0f837570195a599fa7501d27a000000000e8000000002000020000000f5455dc49530b961289aca7decd839c023a5ecb3d10e65f801a1893ec6090e9020000000e966b15d34d445c0edc297a92a2b2a6cb7a69e57ff2aa3c8ad1e8e47c340b1bf40000000c53d53edae637f46203ede2060d6112cd2a42fa49d056adee82445caa3f8a2e0c03e1cab5c6d26bf824eaca2eb76c787c6d7d35929fe37f9e451460c88f9518a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427599468" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80cbf44941dada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{52CE4BF1-4634-11EF-9EB8-6A2ECC9B5790} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2804 2212 iexplore.exe 30 PID 2212 wrote to memory of 2804 2212 iexplore.exe 30 PID 2212 wrote to memory of 2804 2212 iexplore.exe 30 PID 2212 wrote to memory of 2804 2212 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5e7117b122058c13f926305fc4f9d042_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53726aa5afcbfb81920f8abf83086f0fd
SHA14357e4022186e711226875626c18ec787c15ab7e
SHA256502c373a250b17026fa36a3fd4d85a90fc7de34c2039e4e99985e2f6e8e79e5c
SHA512df3e47edc223ffab4b1a7a02eba3dbd841322a3d72eaee24e79afa498a9582de24e42202e967baf7cfcb76a3e770b36ea563b6f0980ca9d4ee282a943e74fc3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0eacd6325ac1fdecbe77010a81a0b94
SHA15081e09cc14cdfeff94c780951e82a32924117c1
SHA25644e59ad5be55da2413c113e060dafe508bc1651b397a18db5e753e72abb63b46
SHA5121e94b16e5be4b82b982b5bd54f9e62f183a418cd62c2fdb167bf2ac062d3215de65f84bb0f72a630819c40fc3b9a0ef3c7fd08de1cbe56e4b01fbc2d5b5895ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51707a1f7df2e1d468321da77c2b48726
SHA189cd7c001f5a36bde236f516f898ad21a24049e9
SHA25604b85864e76b44aaba3b89c6cf8c32e765aa5841bdb4d05cdf8de5b58fb4235f
SHA51201bd3634732187226e11718e620b5660fbb8fb94c8a53a1aa00c1422cf4c0bf68e6bf32646df8ce9006d0993fe87f06a8dea46dcc1051aeff899f284add0ae7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e36cd8f89b3b71454104f5ebd9c3e40
SHA14007e77ebe5ce149efa034ac44a4cc8899a697c2
SHA256d39e398b0fbfc44bc5c315fca2d1bbd48fe6f8a0bfa47fed97cdddbefdfd015f
SHA5129e5e9709c9765f82ee56a8c16ace710d3014869a014c765ba622a4511a1456bc421f32e1590bb9532555365e125b606bdf3ca3c3eabe407103b8c156a50a4e85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597c59c86004526bb6f50fc2135bfbd4
SHA1f0d046f6cbaa097f896936eac0f7ed5c03f6d4a7
SHA256890f1ed663226d935bc2542ad7491f9db9c7a0403d32c1fbb11879a728334648
SHA512b4ea08726e60f06024a2373b9c5bb111b3cd467edc67add870f82c416dea0c652cdd15d1398c4841a7894e4dd0cdb1bad6c55f3bc9e6d30b7c7d23f3d2340e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5cc805690d604e3abbbb218427eb3ff
SHA1a25c6cc1ff0d1a991afb5fb2af93cc030acdb5fc
SHA256d196245f974e12aad30cafd2ef4a3fe3ca6c23897a97affa26e187e32a2f6be9
SHA512020c802b79878ad7132852d9c1c3484e90b8cd4543dc301097ce8511df58b9412bdde586ce4cc86109b6ed49a14ab09fb069fc4ee85abdd4e2a5c355afd401f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f27ee76c968e86b8d86aebea2328423
SHA119ebf619418651b6091478d9ccbb7481400354aa
SHA256f41546fc14781a00bcfa7a7373c70fa294a9972c78fef7548005a055349c2f61
SHA512f4f7e5c576a8953fd573afa22ff886a6d855eb0bdf8a98e56385383fd62b30bf40c90fb31b7b1ec3369b2fb5973030a11dc8c91b5fa160384d0ee1c814a6ad0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a45a313efdb7ae27c7270930aec83b3c
SHA1eb95b25cb099fa43aa298e5b2acfa2588300bafe
SHA256aea5f00f249bf557b2ab4bb3251c1cb5651e5406fc4be2dc1c5c652aceb8679e
SHA512a0165cd6fe6df41c27d034b9a506278e6f16b99f4c3652832e35471f808edc8a520fba66be89a322363b2dfd22909c2cf1a1b16cfcf0b5f269cbb346db3ad5dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad8ddce976467754ffcd2b2c2c1900ce
SHA1beb270f88670fa28e2f98788e4712f8dab75a574
SHA256aa0b2ac613873b38bc5ef963d5d7092dad1b89f47b998ccf808c168e79e39279
SHA512610ecd32ee723576a85d417935885ab461c1936dba84328c78f7074e8f36f600578238abb830f39eaba057d5989adac61843efa2074754899a695cf9e9bfa34a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518bc2b9b52b17c2f6af85b12091789a0
SHA143ac6cb1cf023153fc725a7546577a083a820a55
SHA2561b3c824ecf615f2589187cdb32304a57ca2fd831ea86de321271b3c6fdd41f5d
SHA51241226f3d8ff54e19f92e655966b79f98bf6322821005e5e28f652c400078aa4fdfd0c4c9491494644da8d69a4f3d4e3819991d8394f733886452ca936682c7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b363d3349b8175ac8bfef7b286bf58b2
SHA137f990624a972211b8dd28c0c7d48e16f88effca
SHA256879049ce2f52f3150369792170f7b156ea56d0d2f75525d685fc638d758ecdc9
SHA51239a4e09dc803057bdbaedfeb8f88b03ae66dd55241b7761ade88fbd61535da0fc94a8bc7fb72cf627019bf72977ee952bba77e614c9da5366dfa28e310c32b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b5ac9d6d2b3e8a08222d41ff7294e8f
SHA1f713a9ca5cb8768bb2fc7b947c8531e7d3b4532f
SHA25690f011f297928e8a80f296539b5bcba0ee17b12d651ca2aba2d90124e410effa
SHA51255aa1904a4517efbc61db766e6edd3105806fe635f931a730d22e23b9e04688582df0ae7a79ab2d4af652d0362113b70f9baf096e1c7f108aac39f08059c2cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a03af8379fecd907517822c345372e57
SHA1e8dca95df9ce758c1c0630fb9c61cfab374e2f60
SHA2565a2d2873125e3789eb93326acde01acbe75fa973f58bf5fc3e84d507b926944a
SHA5124c3dcea4573a92c955e4c1c9b026876d383ce6e544bc37144670b384e31187daff753d6e3148a089b9ad86cb33379fffbd52369219e5ab3d3f987f0cd2a78a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de8bf9b7c4b5efd94791d3a939576c01
SHA1cba69a9005e50cc3de8ef834da2e5d22459ca12b
SHA256c8502915fbea409f4fdcc20d7403fce817fea7f27b6522ef2ba0c543aad90f9f
SHA512573b2c34a3c621543bde6dcb9aabd950ced4b5e77421784d4550cca23167f4545366ad1399f54d1b4f258d3e3be0f259058a1d196204a0f0d81e47e691a11317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ea96a33127192a7f3d7b3423f7d02b
SHA1ab8d3f96c08d266ee2c505db028b92e19db73fa4
SHA256f7f84ecd9d882b45c4cd4bfcd352c4eb07c0e3bce9bb56fad932022b47a0f91b
SHA512cd80563df6ecc597b611a1dcba201d86ebdc9ca48a7e06ce51586cd58d6cb8220cfbd8b2ef4341a3db2fe05d5199d77853c4465c7528af3a46df2ade6400bb59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5841bb3707af142303b6c02405d21f5a7
SHA17e0737021841f86663073f969d4a73d07ec022c9
SHA256eef11a258335fd6f83d1688dcb1f39f209659e3b2a4ee0dd5b3e6de1c5e80a16
SHA51284c91fa07a351e59bcd0bf87dd207646115b233554837ae6fcd5481f07abcfa0877bb3ac3f4f129bef2feb7e24375237c087b3f1a5ea837bd7ba2c4ea5d2733a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56646d667eb80b49c89c6752b248a4cc1
SHA1069d7a1dda7d2408f1e0d7abd1e4842954261120
SHA2563cb23591f1799bdd26efc98dd141c3b50701b4896b7e2157c8e2c439f3631cbc
SHA512ebbd47f7066059c0d1f051f9ff8eddd4f008e5b94f281344421c2d68ec2957ac175c1da16404087ced06defaa782acb8266f05d300edead5773a53e1afb222db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e447f7304f1372fc1fcc51a93c90cc2c
SHA153e75ca5d48fb2193d8ee557388a09e0a158c857
SHA256682cbad049ab26f9fe6637c3a9edbc5cc2e51cef2d5962eb8825af3bf9eab841
SHA5122b029bb81c170ee04afcc5e9bd2e375c2d4ff424c8ba276b6be9528f298a851a10d09c35640b65c70f54081222e0d0aa1d819cf30ba5ba677880139624ef25b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa3241983fff695f06c2402a88260e7a
SHA13b5678f5f204f106d17b0603878fbc799dba274c
SHA256405a8b4b17633174757c2b0e7ba19eb0429d45242076b4e0610dae4f1a32c39b
SHA512e52d7db535b285476d058115364317f0ef671bf4ddb1e9504ee430e3eb8fc7e19246dc9a10c36ef0370e7ac78262b70dd666c8df9d2913b6d88806997c74b23e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b