Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 03:48
Static task
static1
Behavioral task
behavioral1
Sample
5eea6d929d771af2ef22db2f941e963c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5eea6d929d771af2ef22db2f941e963c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5eea6d929d771af2ef22db2f941e963c_JaffaCakes118.html
-
Size
9KB
-
MD5
5eea6d929d771af2ef22db2f941e963c
-
SHA1
d142fb17fbaf0286076672af317c8fbd31b90814
-
SHA256
179f70539594424f13ba1287281899a0a4289ad94e4d2cef46e1176c92828615
-
SHA512
eec64685f1dc9d371b80b226cebb4c7b9aa9a908640a79f18461f496c0ab12f1a82f5765ef703c1bfa41c9197f797b22357fefc492409c4a06d2e33596f1da47
-
SSDEEP
96:uzVs+ux7HmLLY1k9o84d12ef7CSTU3GT/kwnpbft8lVHcEZ7ru7f:csz7HmAYS/GObf6PHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EBFB2621-464A-11EF-857A-72D3501DAA0F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427609175" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000e984035435a3eeecc58a5308cd1b0d45944bd41fc8a88008715076485e78d6bd000000000e800000000200002000000007a674bcd2c672b2e4f6523ef5cd0c729cdaaa974b81d3ef595d0553638fcb9d20000000ffc6ae0a28c261d70318cb5c24e935384c277d0b16fff1fc92c3d5ef709bd64f400000002a76d3428d23688401fe508e03951c0d197e49394569c907c901670fbaf863ff7b1398e4b52fc5e832f022a02c0c67cb3a4f81e247903d7cef04661f81bd114b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606393c257dada01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2488 1700 iexplore.exe 31 PID 1700 wrote to memory of 2488 1700 iexplore.exe 31 PID 1700 wrote to memory of 2488 1700 iexplore.exe 31 PID 1700 wrote to memory of 2488 1700 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5eea6d929d771af2ef22db2f941e963c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2fc9a7017c365eea6d4b9eac9480d10
SHA1ce701558b3396e47dcc6197f5f357ffadc9ffe74
SHA25643a5aecef57971dad1d89608d979e9a5b59e35920b42f7313b552ffbd1cba4e6
SHA512932428c6a1c1e4c72ee6f16525a3b206aa0ecb5258f549d7cd8522271cedc6792af51ed13c1e72b27373b1e795c85cde0de307d05cff9d7fe7939f4d7ea70c4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cc4217e6aa504e64f9a47b98f88f81c
SHA1bd8b5339e52a38e970b8a1835a0803dadc63be12
SHA256d42e43769c5de6070a39045d2beb3bf5fb26e450cc7b0c80741876f5a4db6ca9
SHA512a978e96ad74fa33ca4d73f12ebd1a7b766e57122bf995ceccc038a16343581b4745d9638e8353e8d64bfa347cba49f0a04522beb0df3ab225be5ae3103579158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f80277499a0b3a67dd31cff22129ee5
SHA1ba1942e0135cd6ff2a7efd9b315d05541caf873b
SHA2568f1a9d23f102ca62af83f8b4e24f8bf68b507ae4e9c51a2073a5c3c29036329a
SHA51201cd73bac75b430c7f99d7c33e13f2713515e2816102027f2e99c8129659c5eb5f604fc97c5010957e8fb88b574bfdd55f48bfbcd23b36809f9a0396b1f061e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052c285982e2e5d4897eb36fce709d7d
SHA19a4bbf122496e9c1789ba7981831b5befd19ba75
SHA2565c2db7b634dcae7806ca762a0f6ac7febc35be338261118b858d4996dc710730
SHA512d6b568afd2066145585fc9d1d0d50d60ce5380b8b7aecbd53ec1759cf834618f73da0e2b8501a823f74e0254a979f24517b2784c4ee35d700de25f47320b6a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eddd2794bb2cffbd690ddd9c52c16f8f
SHA19f150565be4c7d261dae7f25a6efdb314c148da1
SHA25611f2ba746921333b7b3cf4b2c9828484851d286bf875526a4b74ca502ba9b95e
SHA512686de89ead8d0ec2d08dd076918894dab9266fafc1f932ab9c81c84885975d057c8af97d80638123ff2f363d4f18050efcf8a02c0e7222a454c5f0304c5aa9a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4fe72755ff70999a15128d996b7f5e2
SHA18c01aba02575be812d9f8a6d3f00d0d54c477832
SHA256028e706a0c7b52a33597cb4b1730ed53a791da814d67664e5ce77873f02692ed
SHA51247cdbcb2a38008b33446cfe6fe830bbc81f993918098a6871073af43ee72ee140c262b2ce77ba2c33ed9f415ea23fc9522159b097085414e209158604229338b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aadd0affb60985147a5a99b8b06a38b
SHA1400c545e294bb63d0ece0a543dd1193d60033048
SHA256c26dab647eb6b2444c6189d1b25032a04444a498664f547e9360f5ff6cbfd85d
SHA512109e0fea0743b6f88e9b4df1da554877b1bf94999d956ac644244946dc78b2fa80ca6292124d4e2d033608a13ac15fc44587fccc34e1639d2316a6e12b23690a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a8f9d89c55561f0da42c0a8ba4a4aa
SHA18d29098a9c45e79642c9f5af3c291fff221515cb
SHA256feb92f632c0c0f314a44549ef788b43b2cc495dd53ed2230043007f363ae6a57
SHA5123ea8721c1dd4ba28f5c79db51172791ab56b1bef11226417ac340ba5a89c7b9c6511a293f90047a4669c8073975310c435611cd3b77745000a4a0d0a6cd68e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ff9c4e04379c718f8626593409f69bd
SHA1b275d84cf7c1cf4bc0ed46ba06e54b4a5bf8f95f
SHA256dda0055ecf878b0ad9a7247644d9350ccc8c5dfda59d83cc11dda64c28504013
SHA512e4fbdd9150e68200d139dd1de57f058eba45431aca12f7371c77fa44d50433fb676a48c746770dfdb5fbc8f8355e2d42a3a93c70eb0726bf628dee6357725350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d39bced9c795b51b3265339d37113f56
SHA128f25da20f021c4ee6f94af982c5271fe1ec0e15
SHA256a2598e376810336733bbaa7ac7fa0b6d8d986a2a614ba2e27add80e0de886f15
SHA51219e23f5507e3c8efec635e02b4c2d8fb638a622f3c62d263e56f05f4af3bf8c3c17f9cca6599f9fc82c72d380b33d83f51759ea713dccdf3a8f4e04fc64f0321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5660e1a38dab826f82db79ddd77ed1058
SHA123a2d3b99a6e1750f538e567fbdbd93d5152732f
SHA25621d51c8c0e214a10ab37b3b926ef15fd38829454e7a0b45b2dc89573aa2fdd9c
SHA512cda0b84ec59fc8b2cccf63759bc9eb8cf25cf21ad9c3ffb228fd34cc5064ef58441bc18136065c61b3fe7064734b04e22fdea9a4e84c87d47328e43aedf6ab04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c189d07d76cf89b74541c3daef880a88
SHA19523800b843c4a9819d75401dc631db0b38ca6ea
SHA256b20f85ea356f9d8c14165eade9cbd5ab8ae7bc6fb2f25d00dc14b2c52e23a250
SHA512123a40532f98238043011b02b10759b6969e17099f2ebdc2d3e98df3556a4df619b784d3531c931d4f363b9876f6544e219bb4ce285787b5e85320d6f7020dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa2ed9354f8067ce1c7fde15db47f22c
SHA1dfb0cbb2d0bd8cc4b1d931dd200cc3a7dd6ba91d
SHA2564c96da3c97fafa2575b034ee792e7a5206e5bbdff6247ee651a3e492911bc3ea
SHA512f21be7b8569598b998652e575a5119a249f69abb1af9fdb854b1c9276d8ed7e315be23f28bb3ae304a909da9182d2e30260fcda0914d84a3947368c3428b644d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3f18cab79cad43e7a1de5f3e55de5ae
SHA19042aa65bd92e6039ec720b39971d48a97d3d204
SHA256171391bff9736c8d70a861ee7af7036542cda8ffae8f6674e46dbfc12c5aed5b
SHA5122394cad99bc2ed61ef199b382cfadde7dd00ba27591aa8f0800de490545a03f33b77682ded63f46f0f7f7d2582faa25942e6caa390db7c3b03169a30061730c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e47dd7956c86cec579ee9a32cebce8a6
SHA181d5e2c70150600aa1b5509dc5c864693fa6c151
SHA256ec67f3c053d75d66b2d665256411e689af02845b496a241b779dba2d34b24441
SHA51221a76d7fc6fa18ca261373c764557e59a905824a8e3e929b289d9c59ca8b4b92cc94599647d4d005e186379866395db9a990ac7d7aa26b2603aa3b5aafac5bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7ba49c25753f0cd57f525f3f1b31a22
SHA1a0585a226e1806e8931cc52bdf22ebce54e654aa
SHA2562e0b42d6eaf377243c7c0fd4a6a1b6d05a0a1a5dc8daa492b09404de556ee80a
SHA5127c2b7152f0eabb6aa58508e1af2471cd6dd11a774d3b0f7e0fc7beb55beaff00998a8befb1a92f32052d560d7f337d4b8135d03eaf8d9e1e6f86a43699aabfd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efef0c5a67f1aec6cc0dfdcaf1ff67f4
SHA1c6778053feaf7c63d9a6a0530902cf61f797ade9
SHA256ceef0ff63c61fa6b0fa554bf9ea346a4225a0547bf0eb8ef5099baba86fbb569
SHA512492a635d3cb7f00137228d8076599be1e2d1c9a967f4b7fef0bcb969b41281b4f7f422d79d95707ea20aa13db53d5548585a7b68cf5776b9aa1660f3afc56fb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3f0445ff621494759aa8499c7f12fa9
SHA1e94429a46b4240358188983573086f12fd317738
SHA256278cda3b2bb9e50ba643d6356093d1a71766b165cbba69164f0ca192ce3fa7e4
SHA5128bf2e19e6b26350eebe0267f76b948e612af09a862e87e72353b0a65db7b1d5ed5950c855b507c43ec135480ee03113b5444913691ee715cae3bef0bdf6abf4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5526c1c2649442c69e5f2f9abe6a8bd24
SHA1ffcb338797cfb3d162342fd20f870ef8def46fa8
SHA2566d68308544b336f2d78f348912537d4745e54c8e9329457b314242a57f73e513
SHA5125e3c0c8864503dc988669135ccac503a0d63801084d4fc1a98d037ad6102a0c4b8c5f0765f624628db0f11b7d74a3b0411970b8c69d3f9933885ee42b86f2754
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b