Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 11:18
Static task
static1
Behavioral task
behavioral1
Sample
6303f99570a5133007947f1496ac3aad_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6303f99570a5133007947f1496ac3aad_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6303f99570a5133007947f1496ac3aad_JaffaCakes118.html
-
Size
3KB
-
MD5
6303f99570a5133007947f1496ac3aad
-
SHA1
388a55ffc2a3390cb45bb27673307ceb78eeee4d
-
SHA256
40112cda6a5a6dc7f30f9223619b6469631b116a86a84cf4cace6edcc72b4946
-
SHA512
20c0cbaa4ef15d9714287b7be3035a50fad21f9886d03397037f072fe232bc7cf154e39600b84064efc2a627d2fa65ec21f8b8ef5098b7ca3dbeaa98f6fc53a8
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DBAB8571-481C-11EF-A4F3-F6314D1D8E10} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c01a33b029dcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000a2b1d8644ce375747904de55d84b416b5a7fc0a0582acfc01fd36760f960dd15000000000e800000000200002000000083293597445cdc33174cad57d8a831e30dc2c4f7f8e10ba1a5f87778f591198d2000000077432ac7fafd958c3d9c3ac2b52bbfa23cd63535774ddcca2313b71d3af19d7440000000d1e46d7f3c00e9bdde666d5d390b40b94f34cca4eaa853c114afe9d054c401761e23b2818747275cfa5dd2c6b7a531f194cd3e10b9583d64cba09de1d30b0606 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427809292" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2136 3068 iexplore.exe 30 PID 3068 wrote to memory of 2136 3068 iexplore.exe 30 PID 3068 wrote to memory of 2136 3068 iexplore.exe 30 PID 3068 wrote to memory of 2136 3068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6303f99570a5133007947f1496ac3aad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf0855f69f84813967c20569bcf1ab1b
SHA1c5a803a6d3bd46b37ce612e7919ba347a8184373
SHA2562600ad2b416c441f83ac68bad68f3cfce797523aed45257fe1d8b24685055e3b
SHA51243a561c053a1b83c206949d862bbdec3d3b6f3a99ed25cf276440325ee0b8260c3ad8aee3d582308e0f15eff5c2ba05398e68c10277a0bc262b8f3500d500694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0580249e58f9fe219e59dd32f413b27
SHA1a34b154fbfb181ab649908cc5004219003754213
SHA256b824a60a02ea18403e6d792d1f418d310ecdc105830557feb5a1b21dfde444aa
SHA512af97359f4a2c675dac1a904c4f85a881ffb9f0c25f4a1b28b8c06f0e067a6c7fd27ab2b9de6bc19c20d4a79f9dfc34a3955123d67ec5cc0917c61e0a0908200b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55085ce336d149c5026fdc71f42473fd8
SHA1bd30c873c24999650e8845a5c3fba553fa094faa
SHA2562ebcf104860642c6aadd0ee00ac1e93c1889aeb5b6591f07bf21e1e2ba5c709d
SHA51267c1146c7cd84e676495c441d7a7a8d8b001e7192614bafb09d310f3f93278a0740f7739d96892e321309e428de8594d9e131f58a613bb2b15fad62c5a980657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbf754ab8b3969d3cb9baec9a308dec9
SHA1e3cc29a72625b192dea2c996ada9f32201fb2874
SHA2565c92b4e8539b6f33c58b00dc3ae92d53eaf45fec356e45d94ceba5c29e78e4c1
SHA512dc6391aa54224f16a912823c8feb182e0471299a6b969003da7694b93df34fc961ede5acbb7f18f576de8b4a5d0d2ae959198eb03ef1a3d36878eddb530b6112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517500551177c6f6b1809fdbc07229a08
SHA188ccf08fcb54a1527e9e4fb1c5a12559b74ed3e4
SHA256d3ccf56b18642368d207b40a8363403046742c86a3d4654e51bcfd243905040b
SHA512fa1fa03ae8738fde3643936d412ee279e7cd3e93741dfc7b9ccdc89e60bfb296d1bd75ffa79a4ebe07a96283ed496c6fc64ba850243ec5e9536610b0fcbad99f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3aa253557839faacdd17e81f7b953fa
SHA10d9a9109f7735553e83d5c82ae26f8211f9e0a1b
SHA25694ae4bbd6e3a69fb0acf1ebaf8652744a3703a2a70b87e264d1ce408c7bb8f8d
SHA5124893c607e61608e527fdfeefc6c51dec2e0663ef72da7b2216bedb106c2814af94f722a1f06f2fe1cf4cc0124bc80fe087e9c73caa9eb3ab83d7a3e9bfa4c4ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a91e43317cac742cf6f1ccd4c34e861
SHA18edb4e11d6926708578a2aa7788dd2d5978c00b6
SHA256a5eb70dc478ac0aa8fde537964a629729473b95b9bdbd3c231f66f65477a3318
SHA512941adab962c0a709a05bbf6f5ca0a18ec4e44cad52629d98496824e63d4f89f3c8e998df1b75f41eabb2e40225c26b745aa07b25d594095e60a8e0bc75927796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fa1a259ab0c6bd65ef4ce8bc870a4b1
SHA145b3829a4abc185e0e5262779baf0eebd239f137
SHA25602bc696c6965a1ffe547dbf6193e23fc439175000adfaa04a0978956f58e19b1
SHA512d4053e55ca365230740bd1986133267041ea8b4b17ba53a7478d1f86bf01ed57eb8560180f2104038137083cc3bd7171d39f8fb6aab119ff5bb26215d73857ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538ab807ff6f8f24d81446bdf9b572dc3
SHA13d69a24b271469a0c2a20d1485304dc657e6d227
SHA256ba08196398546f050e1d77d5fff48a459f649ac3c6c8b7d70e73422ed290156c
SHA512ecab116ab61e2c088586dc1e760ce1bcbebb0fe693456fe31b201aee12f3be17e1e9411d39d3c253e9d7896a3dd36f3dcfeed29086c1173a1e6f6d10d0979ee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562eb0db434bf4501d2a6a201ea70ffb2
SHA155dfccf25a97a0fb670a956801c9969a54316eef
SHA256932a235a573a016f548fce08344648d68f80f1739fcccef0465f0c2091dd3fc9
SHA5128802a949a46313882d6f9de59fa653ba34bf7a913b0cff1a55cbfcbabad40f77e5deda8b9f9281da452379b254dd1274d319a5b04a1180bcffa5985ec5af5f96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad83f0fcfbd5e0618954c3c6e41fa791
SHA177103fc4803599362bbb9cb1ac4044e820547c95
SHA256d0de9f2cf2d5666d9d95a9b050f7e03d20603fc976695704d09833028850dfc9
SHA512e762e1ec14890e94682929e0ae5a00811f1cce96d7388aee60ef310ba5c526de0ca01aa4d0b12d05e3685250c28fc17c95f8f53007d7f3b60218f7eef9797ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c065d596609d9a4b01a531fb5373d7cf
SHA1b96fe9f6808d654bacef6fb0f7abb7d4bd3791f5
SHA256eff4312810bb984484bbb0e83e285b07a0184356d1e7d16490e2f338ad5306ed
SHA512cf852d7c18fc58d61732c068ab74c14e299116bf8cee047c5d5d68e1e67311cf7b664461943335f801d12ef3d30c0954178be6f1f765553c9d30e23afd675a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b30c7570df0ada253198d862112af217
SHA1464e171e1227aeda9aba323c572b06d0b01b2743
SHA256836c5c48c14d93a9c84598eb032fbfdfdbb3256570f4de7a4df6116846cbc0c1
SHA5123b64a9c70d22be5bc1b72985bdcee71d4f8f2d6f25b42ce88fbe9c2f833fe1e0f5e36c595a2ae3198694e896b16f9acc1c0632ca38d3499bc5bf703d4fa42388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f6a5e0bd7476ff616aa437a4c7d2664
SHA1e4f0fe8ade984dc5a71c954d2c227dec8d2f894a
SHA256ddc1ea2f7493ccf51878b932ee4ab6e70384ff2603ff0268f3e7965cec0f927e
SHA512ba086f79824a23f717a3a5de129d39b249eaff98446778a2800946dc2c18b5f04fc404639a95fe287bc516bb845debb5d2884d15da22cbc1266f99efe767c6f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c434b3ee40989c12e535c18d96b38510
SHA12db1a2be047de5a5be325a94ef75812c8216bb56
SHA256e083d29731ac7db9374abdbbbacfcc37f962306190a03a35fe320ba1ccb71563
SHA51287bebf3fb0e677b0bbe1c8f5672b6ec21b7ba1cca06e3be0e34db52a43fd431d48706fdc2b2e72e6f520098a62538ca6fc66ec066ff93b0f188bc22a58cd89c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab077d42c740fe1bd3cd9c2f64c5c941
SHA14dd6a659c6b4c4b7b98b47fdb21ceb3d3e0ba1fb
SHA256070246e1443a6c1da10d9f6b493b56e18c37a2970449e1b01a8fd50a73a03f3c
SHA512d3d033aa82d6e5d2224ca80a36812b4df612d66988d5723a2635f97b13d67e0d5a31dd6c3b7006de293cbadd1c7c58a0313e4e22740a92f4b7b3012b53022fc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c9e5df41acc31d2937cfa61f08ac81d
SHA1279439c0d375f3dceafb795dd73005b83dff85f7
SHA256fcb5e9e3834cf860fc628269065632547062d96d15e97949e13b27d99790191a
SHA51237e05e7e159faed2bcf8acfa5bbe156ee066c9bda6663435b1868ee47da83e6edaff79bda6a5eabfdc43e29d192f8fdc2870d83c9263cf20df6084410752b697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54681367015c218ef721a5867c76a8855
SHA10175ce321d8dbf4fd08f0a42882506d109b1c2d8
SHA25688bc4bc1448437d219900911b39ae7a15d1cf9d16fbf41d5900c33e5108926aa
SHA5123a21c54441f5a18a2c03a304805853e6f3db76d7a1df1e7c93c6a2ad834357b8be35b060dc561cd0a0f67270d8f57fb9a1a8b5a9d8e99b402875f495e5f1cf9e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b