Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
63f7ecf22b1120487194f94b5ce06bd2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
63f7ecf22b1120487194f94b5ce06bd2_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
63f7ecf22b1120487194f94b5ce06bd2_JaffaCakes118.html
-
Size
53KB
-
MD5
63f7ecf22b1120487194f94b5ce06bd2
-
SHA1
6e44c342174ff3fae8a098a24166a44f8d750851
-
SHA256
d2d5c053d7c06be476787bc27ff77c80d7eaea5a411c7fbce1fe8b6226966f6f
-
SHA512
3f1ba0daf9740a73c06898f7f132b2bb23c0141872222e800d894ef8363614e8e361f764be0fc2512f9b40613fd34997fd46cd114ba5dc6501149e496f785cb5
-
SSDEEP
1536:CkgUiIakTqGivi+PyU/runlY863Nj+q5VyvR0w2AzTICbbfol/t9M/dNwIUTDmD/:CkgUiIakTqGivi+PyU/runlY863Nj+qe
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000043356583f024e483033f191edbbe984abe13d973b45e21fd67389127fc0add84000000000e8000000002000020000000cfcada7743b2ab8ad69bcb6ab92013cfca1a34fae6d8c1ac9b6f0de6d801d43220000000386beae54ea6dcfb69f3a48dc74e72c1037bf889e52a4cba7299a97b5122b2cb400000000d21d9fbc76fd2382013e5998ec80ed04c07a82fb54a4ec6d1bb31527eae48ae91800eb85f6d3102723a8ebeb93f061f50b98d25914d50eb0d307feeae1f6eda iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427828558" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B67DA211-4849-11EF-B9F0-E28DDE128E91} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f042858d56dcda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 292 iexplore.exe 292 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 292 wrote to memory of 2900 292 iexplore.exe 28 PID 292 wrote to memory of 2900 292 iexplore.exe 28 PID 292 wrote to memory of 2900 292 iexplore.exe 28 PID 292 wrote to memory of 2900 292 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63f7ecf22b1120487194f94b5ce06bd2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:292 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e9be55261d7b9b087be68aee21610ef
SHA187a95d6334b8fec796cd061492386bb99e4f8ae6
SHA2561357e1ec3b0c22b46435732e3dc57af8dbab0b66697bdc00fcd8b99086cc5ce6
SHA51200a42663c2bfdafa66e844a7736d288b62397b1c281b6c1d3ee71882e5e36eac887f9bee0aabcf73638cd1c4dabb55d22733bd9d14cc65576c6a01ae454e0cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7915f0bbe2044ce9a157a06004a02fe
SHA1173ad8aec49dd30f8671f544c4254bd03b1c5888
SHA256aa4416d111f035a5095d928cf491907fec5c9cff5130c18b48e24aff75664e10
SHA512721f44af7fc160b697e4a0d596840b63968ccaad349dc08a270351d383516752610d3c52147988a36d5c120efb92689ee38b0d8a58e6bd6d2a1ce394f0f4eea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547987cf0d6b2c79bcef1285e68295cff
SHA1bf21637eaecf651d886b1e78bcfc2eb0790abc06
SHA2567bbc085275ee91fdea58eb68d4ea646cd837a58527263a8f2d0c145fe045b3b0
SHA51237e715ab20222c630187758fcc34af572c811379c4c0652251ad482182b352a276ecefeb1e4477948ac692a319075b4e8753d18c646e6550e20787defd267d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f46750649df1b554040b15d887a5bbf0
SHA1be0893c32371ff14734a0cb4cdfa05f7805fc742
SHA256124537843c54c267321d838c47bef72f690165a255bffa2919e2b9da84753231
SHA512aad6bc8c5b3d9191cba8375ae0d0f31d37916886fef8ceb07c84b5b5b61c3c0cd5c910bd9cfe82a58bd1d20bd1f6549111b67f036b0de0521ef029b50af86a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503365b6f972f18c1ad7eb48504fc044f
SHA179f311bbdb6d2b3c7241b77421909dade314df68
SHA2564329f5245fa6b3054d5e6098a933042a1fcf004c1f14d65ea32eef8fe1331c7d
SHA512cb181435043b4cd20df1d99bf1e20b1b32b3b3df50f10f1898f8a48214cb8f2ea941e3eeee519386184dfa82301fec5099bb28cea7378135ab233dff3db9ff60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fce83bef7f4da1a2fe34d1212a0c30e4
SHA1db569ebb1764c6eeed53009abbdb837ee313db33
SHA256dc3d67c5a74fd89d010ab4b2378289a335d6e63fe2b2ce997e541abfeade833f
SHA512d90971bf49a7631017067bb3eb672aabdd5f02fcf9963f62d008d66a1cec8f13b4ec3818fa20ddcbeadca8a1d89d19fbad970b680c4c5aabc5754b8bc4259892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5771f5064de526ff3b3959714a7b518d1
SHA1809fd015bb2d59d7fded69a320e62c03165877a0
SHA2563c935ce8dad36fbb17e20d67452077fdbe834d58cda2f2a707e7bbc241b57fb0
SHA5122bce5ac8e1a4db231f11818158fb8193ad2178b2e8d85643d2882c9e1d68c8ab6a6d7f272ab7826af697c34cb344df8eb85c3d8d60006fc52aa001e626df08c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed7a77a8cabf662c837bab9d72dbb700
SHA177728c95855550d1cc2271733240359d0d31ab0e
SHA2562edb56409fe241cca2a29fdb4335e834d871f4284846f85c28d678d340c9fc08
SHA51233a3410e035fdfbaceb6d62ce0c130036c015fee6b47b9f8b84c19f0cdefa5dd58f6b65623245de74c4302d9a5707e14c06052dd30b14651d0e529b15afa6623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a6d2dd0dfe9c4968b1c3c665a177a5
SHA12796342d581c08df9ce378dec7d57e50a69da58c
SHA25629247974a6bb6d3dba80d23e34ef38bf21834b56e3b8e704113da264cb4d57c7
SHA51224fa0697a19c0474bdb1205e0ce90b1b556af52ef3acdda9369a86c6fcae4084fb4834319820168681315a3e01505b987b23875b031ea173f5ab6c23d0c71f37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5922761f17ccfaea26031e7716236b199
SHA170b2b8b9a1e713a9cefe0c3f1fc6f67a3485b5f4
SHA256f7ac578e2320dd3b5c22d1223d8a4bbd4e6594bd63e4d12b3a051d3806ab29ea
SHA51222a0b5762a48136f691215244bdf4324e86730d9d8b3c11633900bbeb472e9f5fe2ba36b1bc12f0ba3b8076d2b844e222e673969058e977d1aa9062df62ac580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d2ca3a6109d43dc3d59c4560777ba15
SHA14a99411d8943e03db56d1265550cd508c9a267cf
SHA256c7f63dd9b1109b078aacc3c33c5585671693d945b4297f3e4889fec51b732fb8
SHA512ec5d6ffaa822798626e0421e3447f648deb86b434aed8953ed654a4138edf952f458e7c6baa4c377421596b13d7d43bc2553a5e20b0860dc7db7dc2167851cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7fe53a714f4a190c0bef7b6213aa652
SHA1ddd1a747368f7aea8c3a4c8e44e17c7ae2216c33
SHA25635540758433fe8219a3bfe98436883c2c77dcb6068c125e799dedb8190862cfd
SHA512f38420ed94f0aaf6eecd8bbd4f5d9545f3971c1a6416348b07b5e0bdac7af77e169f8e95821970e3c7a071d1554cd400fa800e66d013a9711d6d0ad5359b80dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b14729ef550e170fe32cd417ab14c6ee
SHA181eb938bd545181cde712dc789dc42a6666a0d83
SHA256101d0bcbf7007e50410f78e2b1cd51bbc5efd70f1198c03ab359c4b874ac2837
SHA51278a1cc2bb5b3485cb814c89db5635f8d820c72ee460d62cb39fda24911759d92b397c16f1b2c32d3bfd4c6dbce51b567e0b55f7ffca3f00be52a25b9999c6fd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5470ba68dbe5485d78e958f56bbc65cd0
SHA13fb269b0cd903ff0f051e3e9dd122446bcdeabbb
SHA256962a499b295f1408af346bc5969c82753cea067914569376ae3ea812ecf51297
SHA51263aeb34a62976b87faaa4761f6fe0d0b3e3bc4b9e62c8f5dca188971075c279bd671923905d948cb8fcb3e0e20769e29d7dc7284044af3ed253fa3a6e3f54d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a14f746c8c4aac04c1afee804751a8dc
SHA1b8a22ca8cec134ff10df4be2520d1afbe8902b2a
SHA256bf38979d35a66a6bd460676ead013f0320a32a58e4af4f1f8e789f59d065ebb6
SHA51281b3b2500f87d3639d0f3bda29be69c157496a71fa6b1a7e37fdbcb0a433258f1dceff4405896ec6f70d265b72c426ab80857d40b8fac185b4b7e68fe2f74145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5053432b5ef725d95bbe48d96aa5b7022
SHA19829a6aa5abd8b4abcbc0ae9f397af14b1d26083
SHA25602395a4a43608cf7020ab19e1def85ef787a0a5323f46be925569ae72574f3ca
SHA512622c38913b2e1f8be415ceef478fade65197297543eea94678df277a70ee84e8756a36573a5102bdf65719ef501bcbccd5028dab00a1077df875a3e61017e547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532d101b3c78a50f0fd937a5b274de0bf
SHA1c0cbaa7f94a3bf67ef3deda9e54ef8ab36a4484a
SHA25626a6f853ed17444f6d212e19557c47e737d9ce0c176826862ad9d84258106dc5
SHA512637ca7d444c68df59be816eeee1b1501c32f208accf1aaff9e3b47f7bcbab6a4b9b4a4e9e53c47437d25d01fe7a4811c072d2975e44eb53a19c96a4abdfc3d3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56248312c58102e8ed67ce657ff0c03ec
SHA12933df22024eafd55dd78c2aebbd2ed55ff0e169
SHA2569a8fd65b3af0d91f4208931ff2b56a54f94ac223d039520b11a5ec3ead608511
SHA5121bbc1b33c0b05384bb13aa10a05b70653efe5b348402cb69af383e0a99b953548ed520118be5844967e1529dc10c2fc36fbcf33a07c0524d530ba99224195343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3fbeee65202e92684583d1f7ea3d2a4
SHA120d21cac77de613176c90651435d112bbf5ec9b8
SHA2564016c22f3586a9017f8f9ebfbabf4f409085d9389155ce573e0518b063a48fd0
SHA51220a1766dfc8e1df36b196f6e9035bca33968808d225d307083cfa92f7f7b727559ec1761cda73ec49827472fc76052e51499a0e055f996f60193e5a1189af14c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b