Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
621b95995389f2e92d5f6c1016dee71b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
621b95995389f2e92d5f6c1016dee71b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
621b95995389f2e92d5f6c1016dee71b_JaffaCakes118.html
-
Size
22KB
-
MD5
621b95995389f2e92d5f6c1016dee71b
-
SHA1
f4711ce90d459f074f712099a945a82d9818cd1b
-
SHA256
5a44b8ab941c963a8ffaf4f97276d92bec86fa38194a498b047f22f624e8ffb4
-
SHA512
ab16b2177cc8eaecbda32d518f6f5299bbee6c1a4f426181fe1ea24773f39a3f27805e6c72b359d1dacc99c06d8d6e29c99678e70a316c2895db57dff11f1315
-
SSDEEP
384:oplIcrMNta4911qGTHWpT6yXfN6Z8O/gvLaguLZ:Vj8kgjaxLZ
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08be60ad1dbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000020c6142dd8c0c4f8229827735ab9af18131f42ff23fe72e66fb6fbf9991e4912000000000e8000000002000020000000ea92ba747eef26551f54c29a6c1123eeaabce55750d15532f67e116f4136fc8e2000000069b86c12ac69857adbcbac8935419ebf12cc86e26caaa454106dcd8ae96eb73740000000c135381fe93c7c768b272eb41520b8df0b3de8800c1deb7cfc851a5afef0315887392072e023564de05e2efa7468d8ded97ac87f8437cac1fef250a5f5c89c46 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427771122" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC169561-47C3-11EF-9988-DE81EF03C4D2} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2536 iexplore.exe 2536 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 3060 2536 iexplore.exe 30 PID 2536 wrote to memory of 3060 2536 iexplore.exe 30 PID 2536 wrote to memory of 3060 2536 iexplore.exe 30 PID 2536 wrote to memory of 3060 2536 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\621b95995389f2e92d5f6c1016dee71b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57945b377bbde27ad9540076c117cbf63
SHA1e1da22c17fc29d91ced547b21df57fc2d45627a2
SHA256cb2e507f931ff5d2e9dcfdf16d9eecd515ecd4029a74e6e4efdcd7742bb107f2
SHA51259f914948d086770c5b67a2315a09a530870af881b067bb0a75958a7c7f8db95c0db3b9e11c9773b16ff2c0b75e7c4610ca3b904412ea366caab78eaf9b04583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b849c6822e9e31d959bab2bc8ba195aa
SHA1e444dce00bf6f6a17ded8ffeca6e74c9a9df9456
SHA256bf5e5d62a6de2841770dc10ea5a8085dd8de625fd631720402d7eeaa4bf38cee
SHA51217c00824c04e3b5ba735ea5c7b0fb4baace6a4803940069966678954c1c02c50f585c2b3f62699e8a2b5a6cafc1a2bb8e0fcc10b6c1fd8aff238ff51228f2d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519866c25ea90330a5db4972a7e8041ef
SHA17fc8a6f4782f87c5f6891073d54513370926e44e
SHA2562baaf907db1c367195a343733ec4cb1ca64e383beba79c0ab6fdcf8feee3c731
SHA512ea7b6a0e41c76b2751db048bd0709a190dc55f31578135df5a37e4f120c049e6d38bb305f41762fa7bf0a493d632f605ea0b475f74195df7599c37138aa30556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589fb96fb28e0f8a11a365778e5f3e7f8
SHA1d03ee17e496ced20e875597233949efcca70614d
SHA256c261dbf29486c5d61860c5afe4540217883edd92e62d6ab598e70203121f4365
SHA51218d566103e4df1ed470f53deb80054d2f1851753bb55a50f75e0b8426f81ae3477e00f601bb2d21c6619a2980ec0115054ee85d9a6b11437a9e127f2a92284d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59602aa2fb18d9a93b68665359466560f
SHA1305c4f4d59cae1a73ace61e6cc25b1bb7922d49e
SHA25628fffe911e0655502ae62590d9053786f01377566759f4ccd876cdff44dc24eb
SHA5127ee55a912415ac920f329d476d8b7ab92cd7443e01464e7a34b3bca502aa54404d61a7ab1afa534d87dbddf61074478b315cfc5072d26d178d3f9a61fe891a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a14590f41831559344c7d0cd01b4a2
SHA13304455783f704b7fefa81ee7d446de623a2e4fa
SHA25624ee53222762145c19fbdabbdee49d5315876f2fa9d17de0cd3b6afa6e9faec5
SHA512cda70212dddd7800b93392c92761fccd73b53b253d2325d3526acc21d8727873ddfdb723fadb8783c3dcf1ffd46cdc42a8a6570f26079230ce87ce736be5faaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0a4159b131b47bce9ba1bbc0c5f0724
SHA1a9e2aa68f6bea2f31df60983ce1979db5384fef8
SHA2564a9c9f55eb2d7f35bc9ac2fbe8b3975f4c4acde947fa0438a047b0e90f1541e4
SHA512b4117032804bc297278a1b72ff6ef4a5e77a372602547bcf0d90cc8f43b493cd93383b1b62a4f1c85fc3f103808bf8a14652270d4ba9705f30028250c87ccbc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533d9066089a21655d32d981abd46bc39
SHA155e8531f3a4d34e837703ea3b3a1327952c5b395
SHA2561506adbd04753f0045e8621681f4eeeb700552f0807aca0394f3b3ebfe613f74
SHA51242e7ec95580fc9dbb287362cd199309d64c3c883fcf319fa1f20e00b21bd73cdc831c1b401e3060bf9389f2d5a8c2743efa7b0aeb3003330b4a337b22330ee49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d52a71dd05b00fd7d7af140a1e8f90e
SHA133e339e63ca3821c08ee84516d9abe076bc4d68c
SHA25659a042a83bddc68fadc2438ab47cda8e1e5b70a34974d7c04dc90433811a1376
SHA5126f5f8d667ddca3277e1e44f0b69f0640e8fccaa2f2fffe89f0b395d397ad9f7e3d9662a53a30d98c5ac4cefee989d4553fde53c19f2b758e189b8241ff6a4c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0819ad264d870350314b1e035d32b7e
SHA195020162b07cab9c3a0f789ac45ef0f32b08c95f
SHA25669e32f103ba733f0caf4f080a13b919b859433a6eb6f99f7f701d63f3839a00b
SHA512b33c436310e5bffbb8867c21053c0b3cd064baf2e7c9b3badda79c4718b97e495bfc049fc2eb1725240cdae60265a9475ae16d0b63fc87276fc07a5c755a3eaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555fd525bdc868dfcf37c7097b63728b0
SHA17777f65bc31d7e0da3cd8033164df173616c7a3f
SHA25674da87ac5b11b69ac559434bef4c4fb16ec04e29338e4f9d3844f270d2e9a2a5
SHA5127b5095b888e57199d1e1b03e633a1676d8a54ee9d931ff2911f0756709e7f55c6baa71927beb9be96ba75c4a2f3613d5711c5d6bd9866c0e39f8ac2ebf710401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505fa1a780bab3e7987d6d10cd56f9743
SHA1bda936be5a5f36a74b342eb32407d9519cdc5bef
SHA256d00f05b568602e42c1633e8ec3891ce9c6e761a3d811d5f2099a36a195f89006
SHA51223347b8a951e6a94b13004111829f4d4e69a0569d12796c053c6cf3dd2af6c600ffb7b4166fde2d8ec4a4b32fd30e540e9db1c1b5e135f79d4adc77cd6762dcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f6aa4895d3747495b6bc287c0c7700e
SHA1c8dd45b7b10692a714c6d0d19578e93c7f74aeaf
SHA256bbd2c3b50196fa0ee1d157c1fcf983034586e2a3a6da9137bad4494973add39c
SHA5126c23e57e08283d24315ed20a1e950f2b9d33334ff128e5c5f6bae35a029cc3aa685bf6e4ae0444551c11ff9415ca5c3a81af2791a39176c8a90d70c63d64f69d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568faf0484cbe231d3786e1bd064aa825
SHA197cb95f957b1719adde165bc512fde4bc51e3b6d
SHA2566db3aec56d8e1b1286e72d69725b90c487b8e2d60e0fda3de21dffe98913434f
SHA512e76d95db798c43f8bd2dfae1ba77df4cb9182cc70fad9df59490dbc1beec088f66a31fbdfe6d3ce644a7ffb7c502ed67962ebe026d2594943590d8113c55d51f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5505c15b6bc86307af5a1a75186b49423
SHA1435e48c3fc011a99f57cbe3c71a544f4dd8b0ebf
SHA2563f78a50e868a0231d479f371c72878292429cb3f1f4988316c01168f31bd3758
SHA5125d79d7c2c607dd14f752c90da1af07e6416601680a4f357125990c0d75b9f7cfecb67affd0a3bb0aea5461a64c628f935e39892bdc2d677a43787d10c12f9dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559a2c4e805f9f53275c38c90f95da2d4
SHA1716235d912a5952d06f82e5fb30283512b5a2f3d
SHA25699f8da25173f8da35463363db78f74ec9925ae28c8acea36cf9fdaa0fb4158ca
SHA51276588dbfc19fa1dc652bc3da907571c814d02e3b65bd6eb420a59c92b09ab1ac6d45e197a7f09f37c18bc57e7051212e4d31be4627fb79b4b586e523d79157ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b545bf367f41385ffe22de0c43b4ed3a
SHA16fb959e6c0b0663499d36d05710089323d78621d
SHA256d957564edfddf257bf1f51759d5f7248f8bfb64cd84df66592d5b707f05365ca
SHA512d4db48c824f1daa51d5c7f9f8cb61f53d0286ad3d008d384dbda1c35bf134c3868bce41115672db8d0533fb9ba71c447e1d7e4ffbfd16bd44401a5869a16161e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58010fb78d5627c026b48c18f1addf998
SHA11a14150c2256f29e38028da4091900c29d4b1334
SHA2569da33a44166d63acf55715ec2b5088d8a7f7fdafa3f9b705de0fb049515b72ff
SHA512473e9297191937fff532d7e932ea3abfde6005ffc27b1aa987a2b128dc7649b449415bf87f4a15e8f5a0e60e2f6f7d5bfb1cf1f0c238c91acd9722b55e84ce70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a6aa0df66c65be51153cb6fb644196f
SHA1a81fe1de5e58e65994daacfc59a6eb3379adca8a
SHA256e51e7a52ab4acce2f729f5ba717cf6b026fc36eaf9579b656d0021ad7342dc7c
SHA5122564629e570ec7748c44e419a87d662e08c5476c634ccd135aac0909bf67befef0f9967cc4d253c227220b08bd4dd369e68b54e4bd380f06e0977d095e8bd86c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539bf32b32009503a8d95ae063514e218
SHA180e1ee5d372e6a81d31256d4e669c071116d0eef
SHA256d48930b8a88e82295045c8cc70b7292768bdc90c65c1241a2456326be4b0d2e9
SHA51254ec13a518fc7e80f1c5bacff87cedd379043570d8b5662d3a061b8ba4b3897eeffc2d55d7001bf5e8daa8ee16f84dc85305b4f0c685a3026c045175a98baec6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b