Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
61f320945c1feaf0dad229dc120316ef_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
61f320945c1feaf0dad229dc120316ef_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
61f320945c1feaf0dad229dc120316ef_JaffaCakes118.html
-
Size
53KB
-
MD5
61f320945c1feaf0dad229dc120316ef
-
SHA1
d7167aed46cee72c657ab59950eb1bf803dc5efa
-
SHA256
2f5b0594977b921a358adb23037e2ab28021af41fa23d1bd6e531a28e7b37c40
-
SHA512
8a1461d193dbb1c5f5f7b2c1fa1c54784ec5c7506c7895cdc4ab6c9ba425f93f8856205e3b8eee0e4df0a8c8ab9363a5936ec21347786cd022e555e8a8dac4f9
-
SSDEEP
1536:CkgUiIakTqGivi+PyUJrunlYd63Nj+q5VyvR0w2AzTICbbHo2/t9M/dNwIUTDmDL:CkgUiIakTqGivi+PyUJrunlYd63Nj+qT
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0dc198ec9dbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000e8e995b5c6d026048cc7dad5e03e17b0dddf5515898d2fb14fcdf5253b8bdf7d000000000e80000000020000200000006127857791f3b32ee5906d185df32fc72ebbb159d0eb3c73440da094132084ad20000000bd573b06438a6a040116e2002170ed9ec9b83f05cabee0ec4e646fc9a08945b840000000ad78bc10b9404dc56a8a4a73424ef33f6706429137dc721ffe956bcabdefeb0a57ec47728155e5526fd82b62390037a4755141160a163f2da5df0af2cf3efc53 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B846ACF1-47BC-11EF-9982-6A2ECC9B5790} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427768002" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2712 2668 iexplore.exe 30 PID 2668 wrote to memory of 2712 2668 iexplore.exe 30 PID 2668 wrote to memory of 2712 2668 iexplore.exe 30 PID 2668 wrote to memory of 2712 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\61f320945c1feaf0dad229dc120316ef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a6fc767739bc62aab4a8799ac45dcad
SHA17428714fde18a629f25b5781ddc246a4d8c72b6d
SHA2564df1e6cba407b75b0ae2f4d2992caf4fac8efb3ad3028e02e3297e754b3fdd4f
SHA512fd1f0aa7358234cbba988912d5ec8a41ee80a4c7da37cb1b3244cf017790de9e764d71cb93c9416ff1791f7b1c96b8c904e06a724ed141227089eff6ca4212f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f3c0378326a87138decb10101c99e71
SHA1cf9ff5ece96d4c983c47260ac230537357937a11
SHA2560cef79bfe6e347578239e49bc139102e1f4a6411f4d93e70c6c49a60f7bc4f0c
SHA512c41b90b9131581610651dbc30ea677efa1dcbee6c209d9c70f1795bb98840e92b7bac7de1abafcff76a34db11b8ea029be258666e77e9dab56ad1a659f57b13a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fea76f9813efe4c47d46d127de3a15d1
SHA16bca950640bef55fdd602722fc7aafef4d5136c2
SHA2567cac962521b3b99540e699b8b0f6708cfce0b90b634b44bb5ec4b5b1325bc156
SHA512eb48fb6e2f96553ced3db8793cf477bfa447db61b5cf7aa23b2a02583a8db54b8bf016c1a5b4decca9721cc8e696c92c5207218d7ec08c06c676eff49f328194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5296ba33febf9188e92d6c390d7f0d57f
SHA18b3b6935ce14bb0bd42d892017d7544a528ad83d
SHA2565a9be9a54bb7e0fbf1a63ea9b2609177f9dc28b6d3e9cb6ffb0f21ef235d413e
SHA51254a2912294799be92fcfa97cbfe15595bd7fd103a4e7e64717589394fb23e5896a03f01dcba7fa2c3d5c86830d58b28d7a0a082d1252524d5f977f6d0ed0e894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56881d851313cba6b552b50bd9abfa7a7
SHA17c7161a437e7f8b2413e96ad2e4d426631ed4034
SHA256be8d792afe6b5903a0d657a4f723e5699ca7f81f6edf0d4f22ce4d67c6e156ed
SHA512f4064e124269afc87b6e9c75472754f3babfa74ef1cd0624a9e0c7f8b4b8dde368e764afaf7c3585f00c929ab5656e0ffacd4b708770c62c53c51e0f6fda483f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50172cfa8bdb1d9e4fd070936c618c067
SHA12f336dcd995225f9961faf9c4adc896f68e9a029
SHA256a49bfbda124da92d97ef4ca482ec5e450028486b778a5f395da8b400650cc57c
SHA51259bf97ddf686816265748ae22c26edfe9996a843a84cba2749cd373000c39ebda6132ca791e812d708c1dcdaa0be6817c2e5d5db255b75e0ec1665b3c7377849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b640bcd023b63fb0f7ded02dbaa2b409
SHA125b4e4d24f786d19fcda734ba568850a93e7df95
SHA2562a4740d0c9ca89e34b1692d13fe031a91040ca985159706f738e3c0a68cad5ea
SHA512e6379b4dd4fac89f81fe3e5e25c38b72365a5063bdf23bc51d06539911a914a1ea1af01d318fc1a5faeb5094fd83c00b87481eb1f099607b20270fabac41c8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550cea3e3db1c298652d146bac7a77238
SHA1aff6c35f231eb934bd97e89fc48a90cc633ed277
SHA256555af2d904689495177ce01ec73bdb7d5d94c2aada518b8acac43932658d63da
SHA5125cde0498497702ff28dd1960c31c427db4db68ddd521212a2e042db6a4517b494551da16f29f694c1781ee9072a09c9395f5ca26dcdcfb9a9052fc1a3e2a8448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fc89a9930a2ba620099d527c29f0225
SHA16bbccfb35c8c5998ba7cb28b747a56d7468ce42c
SHA25664b0a2a68f4575416058f730993a6d05301c7adc78734ffe7bf6fdabf9158ea8
SHA5126f3d6e3b6ef27f222ada4eab7ce47cb6ad2702a0231b99d379559c2e3bab87a66942c18a4843aad1769bcc7fcd6978d0fd43c7a1ac057010271d7fecbf4c63bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502d8f60951148e7928356b2933f1fbe3
SHA11bda30add17a5f593438cbf649f982fbbb60be07
SHA25692485a59be351ca2ffd8dde3b8fca5c1aba41e212aaacb291fc9f900b5e33c40
SHA512f4bccfcea1b532624c9ce0427d9a30d02f1e46fc13a090f125a8561868f7d8496d51e1d1291832baaae43060b8a597b758ef50285b396afe243873aa0bf7381f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edae44fa915de7b3e5f00aa5bde8dad9
SHA1115f3fb4eee7c6071a77ae7769ad416cfaa417cf
SHA25654f6e4a92903f4f92d5deac046e441a75198a852954b5ce29a4f761012ca0439
SHA5121d3a304df3b58360d630a9cb6acbc4620a2eac95abb40a98c6e81c35d00fd9307ce88884770720e27364e99dca4138b57cf5e7268c003379d7923efe13e78a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e9a45347301a1299a3512f2c625e46
SHA1df5c804174296530defe630eea3b3c1364f7d9e2
SHA2567090c8853c1af4208395b1153db6b6c810563111f6c3181d8b221bf255bdac9c
SHA5129bd3afed902ab4dbb532bdb48670d40063dbdeba19e62e45dda81615beae4372c918deb6b46c3b3772b0c92046c8041a7787e9888a870cfc5d35ee270b8b98f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f84b2233ae86792a85a1cb8e0f4e4f0
SHA1eb77669c07d2d62b6f29597d0bf1fba8ee307f87
SHA2561bb09d1f3e6397ea6602f37d846e44de906f982c0a9101868aa7c10adbbfa622
SHA51238f765895f3b03e4988841f51d02f111b94b72d2b5cd0d9b0fa837021e43204070bdbd5849c03d85f8cf321c644c95111896feac16d9737e4ab09ef6ca66cce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e20793b7ef2e603056b3a55e0b6ba10
SHA1c2427b105bf9ed7ec2b3f90cf014775f5dd9721c
SHA2564cf57e66cdafd4310fa9433c7c18133595fdf20c1e4fd2c2eda4d4996861bea0
SHA512d44dcdcb7369be6466ffb8401c62ffcd9554994bff7570f505b6f16f19dab9e8d39e4b3e97cf46c4acc5ebab53c17df02ecbff8abc906d2ed563b29e9168e858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd084d83e18e4be5000c97b3fb61a0c6
SHA1f92f226b4af7ee14324dc5850e0dab0065d67a86
SHA2569efe4764a8589f8961ba82a7916a0da1590f0f955ea319b8f9d7ce19b4d75c52
SHA512531ad540cfb2ea0e88a3dc008c38bf0079cd5bd8d1ec1c0d131f50aae771b544f8036ea57ee6bffa243e08e993f3a8484cad3ea391cd489edee0768aa86f067b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccabf2904867d4133f48949d028d4fe9
SHA1eb1f6990a7c0015c2c0fd8a072833ff5a4384a2c
SHA25628a554f18de72ab48ecf49c32a45a994d1ebc6c136b5b60533059260dbc934b2
SHA512f58ad1c1b580078236a7956e93967273d45ce1938ffe9403734610170297d74073fd8398eadc542494e5a1ee36c20d132b70d9a2723433a04a52a9fa0e4ac528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536df784c70e85efa4cd3ca89865ad4b3
SHA1b5558508c567433229d5830956ca2f7b9a567d81
SHA256b029bea312dab6fb6eed3e967431acfb08ab086cefbccc31d110d09bde115dab
SHA512eb6aa5897832ee1889569530822566dcdfd82222087d045a0a5088074f8f8bbe70e40788ede5df0a7a0e7108bd836846185b622d38bd34568605848dcb0943bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b148e7bbc8a4513085d7eef9f050533
SHA14c5667a3dce12fc5eccd9ff01289089629a943ee
SHA256b24b282182fe49602d023dc144b4eeaaba5c5054792de074cfe3a8f801155dae
SHA512be293fe69e8e789ab00cbe206b74003d43b39dd2f62c81565eb5dfa9076e5315b2149aa90e65db4923cdb50615178112fabf4b11f040f2b33ab85008e2e950d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f84c66bfa040448ed19c5ced73154f8
SHA1f99cf4f31ea3e4a151ca7741da37ce6e4e18b57f
SHA2567cd77b8a65a43100632762e2d6c924c8c4c7c382c42ad10f40ab72b8de3e6b05
SHA512d2893f3ab331ba25616d2f417a08aa4514e7c49f70878de27d750d033a01a3ce227edbaf3ff8133a9225e74ed4c2338595ce205ead93aaa2bb7c2840f7b80297
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b