Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
628d7dbb8ca0ef8f9a03f82a449fa311_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
628d7dbb8ca0ef8f9a03f82a449fa311_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
628d7dbb8ca0ef8f9a03f82a449fa311_JaffaCakes118.html
-
Size
9KB
-
MD5
628d7dbb8ca0ef8f9a03f82a449fa311
-
SHA1
a641e3df9e8111304cd3d0a46614c890efc20d98
-
SHA256
9a0d3a20e501b6dd124c3d5071c27b92507736edcd8b0abece555a4fe9076097
-
SHA512
812ec1fc5cd703eaf5f00ad59b3f3c6d817498d0ed07dd6c1cae2829c9da6d2ef25dbb81392ceb5afb4b28ff43537e7265bc0ed71ceb0e756e714773e5c260ec
-
SSDEEP
96:uzVs+ux7roLLY1k9o84d12ef7CSTUzGT/kDI1xpgelVHcEZ7ru7f:csz7roAYS/mAgePHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000f0250d890f67774ae42cf6d4f28ccb43fb74fccf9258b311d6ff4484846a1fe3000000000e80000000020000200000002d324da1b241bd35518c10b115c7fbf69e63d0996f7f97ef665cfa381f7588fd20000000b88ed79a34929d4f32cc84a0e31c2229124a028cf094e685aabb37fd24ec6cd540000000d1cdc6257432e041a126027485090e415a622ad9881242b1ae9272d215836f9fa7a3a41aceddad16847dfa1d7228bce1de1695ee62d73d5ad839e88b5cb6e417 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03c6f3613dcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6172AE21-4806-11EF-A5CE-F62146527E3B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427799639" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2864 2672 iexplore.exe 30 PID 2672 wrote to memory of 2864 2672 iexplore.exe 30 PID 2672 wrote to memory of 2864 2672 iexplore.exe 30 PID 2672 wrote to memory of 2864 2672 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\628d7dbb8ca0ef8f9a03f82a449fa311_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fb536228144f9ba6d8ad77b84ed47b1
SHA1c1be9e358f17c9087e0d8863aa9614ddf941a3cb
SHA256453ab34c17c5e87de2b58a37d3883a479c7016cf6bf252edc32b6da3deaa3fb2
SHA512438ad7801dd8f4aade6fa088805a5d75af503febbd4e0daf8bd02fcb19570d0533311d592a5af1ee581fb9dabe4965d3b897df55902029dac476a251713ef861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e139abd11a459be92b9b289aba6a479f
SHA1a48f6b1419cf3ee90767b307b85a3a907a94b07c
SHA2563fc3eb558a9e4484c95888d720bc1e90e0bc574071987d3f32b1e2fe51e16743
SHA5127ce0a7e6a3f796eac5616b370c07520357f4a2e78a18598cc33abf8c227e41319ca6599b4fa853bbf56139f6b676572b8452441fc69e3c2b6c0ba499441128ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c051eccef3c57477358c3801590ad8c
SHA1e027f2a3467d965d18d97192aaef13788467ee0a
SHA25667d3c4372aed8f4fe1df88c3756fdfcd46405e8749c4067aa62106b9f86a6902
SHA5122e02f90d43ac20bf0d94d8d2810f34d516a168923e1c5599466397ea017ddde1c50ec173c24a030fb9d70c067925d46a480da821e90d61c4fbacfb2b5ed38cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50477dc699e65cf16cfc7940b660161b8
SHA140ae7b7865960ea0f50c8764630a4bf527d18485
SHA25646262e09354d8cf22d6a2d0d7777a3819b2fe7ba811fb55ced25274f64bf27ff
SHA512c9820fbd630386c59f3d6419692b53bd4c817f6b730b8c99d8fa73fbaa7811ea40a66b53fd2ce402974012dcf7627dc5683319f6ae28534de0c9a853127a0e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a3d20512c46397f58871d084573003
SHA1c65b41e494c003b79f391f22ebc95130c8a88180
SHA256256081f950000dd3bc84491d6755b026a10a15e71d753ec89db79e324f930b9e
SHA512eb63e5f0b8c02f4720449c5997a9c2c51dfaee39c578a058128f476880121c08d0c747761f41c6ac688221ab39348adbd185fa85dccd1e2950a37a48fcbede2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bb9c762d55bb369bc1b931d9ce0c66b
SHA12d9cea34451822c350c43e6ec08ead6980101201
SHA2564471c2b130d0ba6f3a58a13b46c2a5039270e270ffc2b88016e166c2ead8bad3
SHA512d8bb7f8a5177023b243742e6aa40228244edfa1612173dc33a714b3b9c2b28f6367323a282212c732b05c89e1f6648bb2e37a591fb3ee678ab8626571af42bbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2ff0f6d86c9f0535bb6e309e0065e3e
SHA1e8eec88dea6b7c0592fc9f1db970d8c07c0c1f95
SHA256a255ce09aac361c161197da2ed2c111961322bcc36cc6b39ec93880b10415dfa
SHA512d25c36200ae26486a55b0ed547f2f103b74491fcd9a23d93871659198d65d429dd85351e57528ffdbf1498d80dbf6cee556ebf6d57236ee8087eee0d4e409cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5360de33aa38923d911eeb3daa45333f9
SHA1d166f9d304aa9ff424a9648f83db4ac2838a650a
SHA2566eb9680d1ceb23b8f07b322c4e8b69551d351241400778489bc19214a0460a43
SHA512b7a699c65f8fdcc57b2346c4a365fe46035277a879570149706769bcfa15a9810ec2b612c56d17b02c9fef48f6fef573ad057f0877a9b197d70adb3b757746e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8733527cbfcebca6620a619126000f1
SHA1bde44b94869430cd8d2a088bd1d8867c6bdf06ba
SHA25625b8e166db93a842d9ded60941df7679c80105b2952cc5d6221dc88f81ea9139
SHA512cc1042ef45bebec22049fee078be1e04cec5ebb5143e28f6f7430e49d1bf4e389efe0060a821411ab6ebfe96d5e99c9012cb236ee1ee35804d837e97bcc4a1c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e60deacf30ba776196bdcf14c4e0e37b
SHA1bb7eb6f32b02999b2684fa8af6819f41b0534a31
SHA256c56353633859efd04724b329b70a2d2a4053230c287158f40853fa005248b15f
SHA51210e8a64bec4c511b8ed85990d0924c0ffbcd59aa2f4e5f80b5f0c42a290ad1e5a89ead4224521c1f3d3a8aec24fbb67b61d0434bf4ac521c552c7fc4719c0973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529ee5b15c75f4838bd2486bd3b100d29
SHA157ec3c652e8e91e1090c8185f35ef939f5454bba
SHA256a354198e222d2e885e7b6907b0e931d0b9176905fc6ac97df6bd0858d99400a2
SHA5122cc7754b365b6089e088ba62a3a67388d1e4e7537ecf9c5ebbbc505ee8f1eec8d86880223015aeab283ea615fef0eb9b1e31447e626ef295d1e240de823589cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a119c4a52c9152f93090637244742201
SHA173ef0689a9559760fcbb6550163a62924c8389a8
SHA2568e6be20a065c9e39edfe764c0741abfdbcf6580900fc1902fadd99da925caf09
SHA512cd436a1c90741ffde52f4bb8182c7659055fffd52298e8015d27c8b23957516a2c04aa9c63d5ba84beccac5e213d1aba74bee955108b791bc18bab79caa967c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b0e857ef37fc037bbd0fae78df1677
SHA18d69ceab65f48ab9bb3b72c9c9e47d98fef8c03f
SHA2567e128bb317fc3ab3df445c4938ab554c0a3e36038cc7a0b4031a08836eb09281
SHA512c046526d0c44cd14e3bdf90f4845b40d2ef30876981cd38a31d6754a511a82d27af75ac44b8db7833fed7d58f3ce5389e9bda242997ecad3d3223256d369f064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad00003b6f89d8d0c75f5b6063b35ddf
SHA1cbcfffdfe8a177429774bf5b1499a1c65c4e2550
SHA25625f48e6e9a9bed530946823fc4c3ac101a25792010dccb6fd8a2b7f818636bff
SHA512820db215b0a7a294ae6f7885cea8673d8ff6dc6711543aba04b845065934304a57228ca6ba36fb0323bab08e7712caf3a1c38b2d95077de2d0491a9bdc07e0b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a668829a32871d7330763471b5dc3914
SHA1d88bb024f17d358c44bfb98bd8c97bfa3b11e2b7
SHA256eaf1f9b12cd369755738df3dd846984ddedfa6c47266fd71e7f51757a2dd07fb
SHA5125758c26768533537e5bad733ab09e4442bffbb5f5244a2693338c57a176f491b19fa3c6b92da8cfad7f6470ebd1d91801887db50ca48a018215767ee90cadc5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545359ed829558fb77b3b15ac3d082eac
SHA165afa09d0b881be63471ec1dd40a6b2d980e667d
SHA256079b8fde539a1a66c2af0f349ad71709fb20527702abd21df84486bb2540b51f
SHA5125cb6b3633aa528bfa8d9354e8d4fd514027e0cef771e8ff85f504cd3cba2ac43bb2be18ce9ab630bd1818b37dc8b9397191f7dd76e33e283f7b04cc0a508ec19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5929583839476f6cabb9469abfb52e3f0
SHA12ce02540e80ebb48f9c683079f06ff5a39542223
SHA25627d3143444321a3758b20628a25464107ca5fe78bf80cf1ba75f96315d52ff0c
SHA5125071402c626bf5fd3d2dd8d69145efa2ae607b4791fcf910ce30104d73b5eda4028cf7955fb154bb6f2c034535d7bd9cb9a448d110effc0f08462846ccb9eba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ec326d12fc94ff38b7ba308bd8455a5
SHA117bb16cce5a633b50258d85683f55383d0a5b05c
SHA256696da3ff6fb04aa6b7cff0722309c31b26f13f52c83206a1b2dd2820ddf938d6
SHA512e5b1d7c61c1b69d3f8440a457963d1990ce15ba650080e347b21a7c5b8e03433aa5bae3b8285bbd00d5708c60e52f632c3f8844e10de624b668be5756b444328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b29853ab54268388c7e383634275fc3f
SHA1f5b120bcbbb026a74cf93c6d1dba71d5ddb25f1f
SHA25670ce6ccae0965fb4ab9277271eb3bd4aeac742dd71b146b5f2b9125a2451bbd5
SHA5128d0e9c1f0a9801b1a79b626ecdf1322f30e5cdc35a40deef2dd6ea22c12683844442f6109bcb76f9a16c645a46bfb94a331e84776b71082606f605f09180a14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a75533224ea55bbbc0bfbd09f56fbac
SHA1cd3fad8d4434e991a8da5ec900545eb77ffb1b2c
SHA256d1b35748195e777015b83bf0491a58a7cca42ed795f514485b22f194b0a96295
SHA5129b23bcaaa77485a6b03b6a899c9975d57f05d2aa8f899268fb55df499238e3dec7f8ebb810af75b8045113fefdca86c9fcf328233836fcb7a57dd055f4bfcfc0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b