Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 22:48
Static task
static1
Behavioral task
behavioral1
Sample
651b209b908b13ec14f827f1039325eb_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
651b209b908b13ec14f827f1039325eb_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
651b209b908b13ec14f827f1039325eb_JaffaCakes118.html
-
Size
9KB
-
MD5
651b209b908b13ec14f827f1039325eb
-
SHA1
f936b2977f407503c7fbca99cd2e4ef545b2d762
-
SHA256
c8beb60e202a637afb8c0b853968508900c862103b91a7be8026067f30fdcb55
-
SHA512
f1f80af242e14e67b86e0a115b16d22f861e1d049b6f750ad760218d8ccf6420e2d04397b44911419d62d112cb2ed6e7c092609bf63dbe8c5b8b747601b19005
-
SSDEEP
192:92IsKytsCSv37SlZQzPi3PtYKiviyiQz/2:92Vtc7p1TC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0caeb7889dcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A2A21311-487C-11EF-93F3-6E739D7B0BBB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000a7097e9b535578c21b1fa1fcaefbe26a4fb57a61528067ebd2c4b13b1feb072b000000000e800000000200002000000056f9a10b8ef038fab71c4287088f4a548d7fc3dac75b7b61980539a6088f487c2000000033e28d3dbcf307dc9701bf66ec9d875ffc5a8a997d7b402ba973d483fb1e023f400000000a80773312275c2b25ccb9fea262f83f47b28af2beafc6cc3aaa5228ff584b50cfc888ecae414942719e68b45467faa929026c3c4c9d2b0d7aaac96fed20a645 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427850430" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 iexplore.exe 2652 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2384 2652 iexplore.exe 31 PID 2652 wrote to memory of 2384 2652 iexplore.exe 31 PID 2652 wrote to memory of 2384 2652 iexplore.exe 31 PID 2652 wrote to memory of 2384 2652 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\651b209b908b13ec14f827f1039325eb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de986b29389b779055cdd41413cf9840
SHA188dafd675ed935b2f65fc4da67ba80e41c1e6420
SHA25618941d822b10a5e6b9bcc04ed69bd71d1eaa6cb259a1ae7c191a9225bd1ca0d5
SHA51299ea6fddcfbebe004cb8af037734f27fbf65091e12c35ad65157a87b8106bfa1e809de33ae848816b8cf405db0e98fe65a9a26abe1838872ccffe25c28ec9004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50962acd124dd3d317559d8e4e170cac4
SHA1b9374a7c93d3da35d9f7737f9dfb366e5511f38e
SHA25634d7e9ea306a93ac5dadba54a4e09a13b529594d5022ad2259bd4263b5c918aa
SHA512064a976e994aacba7db2101c0c860d24b3a955c406e755230c3932eaf29c08a3ff524d8b3f0ed73a9ec8066e5868a065a056b1adc395701e61a7330d8383f3f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5175710285b187b65be080c5b65ad2f9f
SHA1fc5c367ef751e6b98751d8f9b8df5a1de3437382
SHA2561e9b7e109f5ef0ed49e97150489be149d03e30c292a18f62828c11d2a746afda
SHA512c4f83229757fb38be2d9a14a0805858beb01d64fd1a2525d63f2976c30e6cf8c2514605eb8c4ce144de585732a1bec102e7254b84c3928db967b21a27d94b727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d85dd680603a717e9f41901a985e7c2
SHA1e2c470afa11c890f6880ee281cc1e8ad0596c8a9
SHA2567f23389cc22c5227f9e559e8f4ff70e007e1582067bb8ce87c24017ab90836c0
SHA512a0debb51ff6df26b4e7afd56c4023e0856b518d0aa6b74d063ccf4eb1715e7bde5640739f5c14404a555261d02aad91ccb1bb4430775e07b9925dec1aa1de805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b9fa22250f4f5b10220233b868b3547
SHA14f9d10ed054370663b14b3df6d089c869ee75810
SHA256de2591193af0c4addee308045bf2b9cf34850d334f9f9068daf89173ed08e59a
SHA512ad68221b0534a193dd9f7155c685389338d338cec73c4b375ba4cadb1c730551a993479f0307fb9ae4f15d571f789d630d5e2db962898dc00a9ca3ecb0a43bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db0b849c79655815fde227fa1cae54bf
SHA1fa520ba10731e6daf92b79d0ac07a89f6b0009bc
SHA2567a812f458931ede902ad711ef12cf8df003d1ceb3de24d62c326ba8a34e47bc1
SHA51214593775390cf1ba77f81ad86aba54b6c17eb714fbdfc3e880a12cf3869d3fb9f69b5d9710cdac285d02cafb8e1d2fc2de7d6f0e0be5f0c3ecaca2cd32acecb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550fa137a3bddf8113d4030570c6020db
SHA1f778f667a79091be34481a140db67e9c291248f0
SHA2561a27c369ce599750678814dcea63e9fd301bb2793cc7c3181ddf2f88e1079a33
SHA51233fa75dee03c102c86689a6291f29731cb0e036e05b56d2e99318bba9801318668daff19e673eb9f20c3acae16f7b39ba1db50958688faac45f0c43ea0f1d042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5236df04c036493929e917422e54f02b4
SHA11effca5d49533e19d8ae3c23721b018f786fa76b
SHA256d06ee6003a64e6bc496e220907fe9b0822f2c0ed3ab2234e3b3ce40f7e922a53
SHA512ac8847004fa6bb01d439a7914b62e0bfdcc2c96d5710aee4c3e1e400f54013794b641e23d8b5089afd4b13f4f9745d4e558ebb83d0b774dd9cc080cfb7ff8704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de56305fdba31200a2556682b8291692
SHA1ce5e78e70fccd8445a6d6af72f25e630767f150a
SHA256ab4e36434f52e241189218a91fc2a1394f6f3f730406c230278162cbe42ed805
SHA5120663c728a5569a93de9fe3c0634f4b5b01dbe1fc7a12fc5c0d5b19b6596405bb681a748099ef1c3c3f977cf1d1b5621f0405148397f8b912ba2df64b3775c96e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e313afc7a4bf93ce77e65e46aec3206
SHA1f60043a83f90287598e0cb38f3da3ecc34b25442
SHA2564a5f14836a98a294f8e4a8e34b6ef301117e122fcc16ce0120ab6d8521b591f2
SHA512fab96430afba345b6a3e2513af16b2960b18f49aa74caff9ea2a3e114ee50efcb4c06f32b719730794b4b906ffc5003a176ff88e0c6ea71779a3b80febca73cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bde8d8f61d467882c7da8f29f6118ed9
SHA1a60686d08cfe129a18da0e8d740a3ec0340aee48
SHA256f2c4dfe0dbb010093c5073ed09461fddd3d2b192781d706f71a6de27295c5525
SHA512ca813528bf1a5e692216505db1096b940934c6691d4bbadc604b663602ac44edbd7f6f468b9b396757f0eef2689634317ec88562153f35ce7b73622c68a1f6db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526521ec2ed2b37c7daa153eaa5362847
SHA17a2a86dfa871b7f48a34f21576daa81aa7d5820d
SHA256dcba6c709379c6ab50f06a68a0d08b24d3e6d12e1d110f40f37aec81ef7bdac0
SHA512c3d0eef9af341a0bffceeddea5d311868faefac35749670ebb29137414fcce4df63e0e4dac3a576857cb4eb0b58f99e4d42941a81bc8868d153f960bbca1bf57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b906baa4e384d553f0ce052844819b26
SHA1935e56e7c662efccd62bc31866e0600fd4cfdecb
SHA256a64b5d0ec6ecc885e2788e5acb0e6fcbf6887501553e79c94f75242d407a43cd
SHA51265faedb027e32e75bb20151b4fa9eeb8d0405e708f11ec08cd196fb3251efc9da965f7790fa936ce9dde99a7eb1bbcd5689c2302bbf0e8ed79f6e5ed54f76729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aebd6e0563572512dcf3a5d148373f5
SHA1f09d7225dfeecdf55e6e886c03ed9a3b9361fc12
SHA256c626b686a5d3065edf07698617cd89576ffa2fa26d08f5902d9549e170a67481
SHA51277f37d15bc3a3d67c7b557f28f0a17ee0b99ae4aef4e90bb86cbde3f4c8cbd76625445c0fcf66f19ebd940d3cd479cf23b527c4bad4c0101ec8c30babe7cb017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bcdc167962a0f596cb8d6c02cc8d5b0
SHA18fd3211051727f28444b33c8b7a1a7242747a3a8
SHA2561be4ca5905a5bbfd768c89f6d349bd7fecae4b99481506d544969c6a758b5762
SHA512195755c5fbe7102bd15a35fad46119c50629cb983704a7f843c461e6d177b04122fff0e19ea36e75197b645efde6a8720913578eff233d8ec3caaca77b208f91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e410fd089f9a6fc6db1029e38885d443
SHA18067a3adb9e52006083c8940ceb9a91b7aaa6fcc
SHA25651ac8c18319359e06bccc0e312109eb47b68ca7ecfc5f79f0f6632597137b013
SHA5126f0c3108add89b26c547459746d2789854ac34c5e0b207461ea9f82cb81992530e32ad7041b7cf81e0eda4a6e3d1403c5b41d1dd4aee8db682017773db62e3fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515f838cccd772b6f5f440647ba474417
SHA1cf4c72e4dbeff467bc4cc7bbc3595a2e5f07a3d7
SHA256c89249ec909a564fa8cd836e22433448bf7479983123c6987432981203da92cf
SHA5125fbb86423cf7ae4779e31462429d562257c39b2e94bcc2b10aa46ed63722ebe71bc29778483b2a73cda46f098e1c47e7152dd80b07eb67d9d5798f23ee2bf885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e09324f8fb3ed1629b9b3c37b1e794f5
SHA111fa453eefa6be8bfa5649321b1230c98a86f122
SHA2566d4b8e11025bce0c416fbfc7200e67988ffb6a66c29f15d1a527d915b54c1907
SHA5127b25d7ffe6c8c3f28c092665f23bc38dc4836581b66d1f22e0a9d47e7494ada44ba3dec35d42c15f61e490df81e6aa8c71522d724778aa31491f305996f5a7a4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\menu[1].js
Filesize33KB
MD554285d7f26ed4bc84ba79113426dcecb
SHA117dc89efec5df34a280459ffc0e27cb8467045ab
SHA256b0754afe500a24201f740ed9c023d64483ca9183fa6361d759bb329462d25344
SHA51288afabcad8dbb0f49cdea27c64783ec98ece295f139d50029d524950a5b40a7971f033529f7b60e5acdef5f0576bdcf107fa733bf439cc76693b654ebdd9a8df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b