Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
677eb52524425454f18284d0597fbbf8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
677eb52524425454f18284d0597fbbf8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
677eb52524425454f18284d0597fbbf8_JaffaCakes118.html
-
Size
11KB
-
MD5
677eb52524425454f18284d0597fbbf8
-
SHA1
7387d9a66b9cd496a14d0657447371d4fda927a8
-
SHA256
19906e1673fd4b9f9d7080015e6fd3548c387f8eca8236fe29ec5b248e17710e
-
SHA512
637ba9b857aea4d1d98f4adaaf2f55dff49d9b2d98004bbdef0e40555025901b1762079ee9572f3bce328d38bb50534034bcb4294494ee49860eb751431a059a
-
SSDEEP
192:9s8lTV8xypqeiFzXPQr+/MR7hWGoiXLfBd+9G/ilTNXqh:9syqcqeiFzXPpkKNXg
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{176BB0B1-48EC-11EF-AAA3-7AF2B84EB3D8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427898299" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000ae81c5c843474f5fc9e4c2edcd7519a2c560f886f6ae3b291f7214cceeda3dfb000000000e80000000020000200000005a56f0f02505c5ce298338deeea93bfdffa4b7b3614748ae8df91171fbe10967200000001928b694b44167e5da27c2dd139cfb04c188a0673ce858c0224ca7d96cdc73fb40000000d76a205fa8551997828009681e04c35783c394f1e51428260b744fda2f7c7ec65fe00a36f37544ab5c72fc3352fc9795c0959f6354a96b3c312d1a592b815ace iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00422ff0f8dcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2416 2104 iexplore.exe 30 PID 2104 wrote to memory of 2416 2104 iexplore.exe 30 PID 2104 wrote to memory of 2416 2104 iexplore.exe 30 PID 2104 wrote to memory of 2416 2104 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\677eb52524425454f18284d0597fbbf8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559c5a4d81c1cdb68d6eaf30b5b82027d
SHA12257abb26da27b75485c9bde2fc2309006d0ac44
SHA2569f4afcc075268544dcaa54797e789183f04473a287fc7f09c74bfb34f99a765a
SHA512eb0369791e7350599f6a4db4260f01fdc5dcc178b10da19374da2078a91c8f8ddfec4323a13f4cf79e93225b1541fc0db0c0d2e78560ff2582a4021c0618d114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7d3f8d59db79f6922393ac652c05736
SHA1ca01e26747c526752e5556ea2fc790bafa17ffbb
SHA256793684b146affa53659b324c1746f9c732a03f437703d614ab385706646faa24
SHA51270db85b0d1f15fe07b8f2851176e1f669f47178a4619f88258b5db2c75218f16ba3bc7a0c0d27d7b2fae1414049755ab2557d0bc39e2028e8632b01b4d0214e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534beedd0848b613fa34e1319e9559cd7
SHA1cf65a880c95cc3d091569f2e09079ed0592282ff
SHA256bce39a5c492f16bd5d59d20d1b63c4fa3e37fb3c1d2c43b0501d5028ae132923
SHA512d9a61278edd498ee70bddce472f63c47aa03f5c678107cb72d2fe30b79a545d14dca642af105919c0a388a186b0c68b826eff93a388a318f786441345101dac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b6a6dc982453f2a4f5bbbcdb6f6c67c
SHA179fe9aa03818092411d07a3285fb9e264fbcc756
SHA256d14774ae7180d6299206854812f61cd3bad3289dba49d27041b1a6ea900d0884
SHA5122fe253a0f388457035ed469ac44d4acc6c88b1130968988c541652365fef1117cd658b51120f80a44888a38b651455228b046030c72ec6dae4430c1ae1666d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f224e27d9f43d674f36f79adcdb1955
SHA140b5b8cde9fcba9d4b9a99be0c2a2353caefd97f
SHA25685d3958cefda3c567a3d9965d278cf20ce59182e140f859d6949dba63a0eb76f
SHA512e0f5f8df6af694fe49014ae0ed017bdf0f764e0ea7fde932cfbc8d95e587abd3f4f9dfbaac7ae91320f72dfc925b8c820cca0078ff3ed54838483da26c751913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc00e275a1e7d429e4452be0251ed51
SHA159d7fa9441415e98504d28e6aa655ab5d87a0650
SHA2564201727eb360c902425bea47d9d5f0c3f23b2fa1356f8926878931b1cabe749f
SHA5129ba26a622fdbdf2f06ded3c378b69f51f8e1ebf018d03a339b7e3d8f26c07ec6e409e7ca593acc91295d5fcb3ac4ab0f902940fc4b3cec7abe39a5ebdcd72ee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56554f82b17aa0f95a2225fb7d1570269
SHA1a9b5bf346e2957d0c32bb3e1ea60ce595be62ca9
SHA25651e7d39ef2a333a16d10775ac6ec4ef8dce150732779a428283168d20666fb3f
SHA5127b0e589a01781bbcfd4959f1f8fcb03d8872347f1e1020471ae27f39aa50195d0d08c4219e5ac84b2fa5ab497f0df1ae0ff2af8abf38ab31f7fc4cfd4ea2d0db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb2a3e8e247227b062a66e4179d63d71
SHA14ce151f9a4e1a91fdd3352da4109235980b828d9
SHA25663273107dce1dd1ee9924d77aa79a6e04ea82f9a9ccc8fec39bb891a4f14a7c6
SHA51298e34bbc7036bb9169aedd4e5bc23f08c006c6465b7dd3dbf9a9438c9b075340cd7c166497b3291a47b23b6d83a89ba789d7144d9c0b5d868fcaabc3ce0cbcf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5692760e864c9b3c8e164b7e8d3f0bcf1
SHA1f2e18031ca2e5e101bb2739f1aef7883dad6df84
SHA2560c1d40156b4c92e57de39805d7ab589a9a73ab2dd0c413114e6a981a0e4f3e79
SHA512cea7d2839cccd03dd59e40d5be67c6c6b500fd8f3cf888557e3c75413aadcc9cac38ff01836b0ced8a62b891338b901884d027a76c4044787a21a9f2bb679a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ced49eedc4aa1243b1d895ce0360299c
SHA16de69d5a78019a815110c75bf14f69bbc7afce8b
SHA256c344f2fbdad53db0b5f2692ac7557243848fb372e402c481baa4ade335d71731
SHA5121288e85d4301ea9f56419861c06e551195760f7eb9491bb3a2edadf285a567b85fb0813d1f39c92b4d77299d7899fcc1705cc968a41f3fa1ed947db8213875dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567fd026cb45649e45c756f3a940500d9
SHA1bf1a67e8d652c514e52cd9350ccec8848a70c037
SHA2564e08bdce204b57c17f66e0b913d4a6ffaeea7c5d3d99e2a44b3be96a77fb55d7
SHA512530746177b5758f72b6023b785c96ad1fc4d7cd5ae4bf07e440b18725de35cdeca1ca715f4e2565bf7b85ffc297aa70861045e35ba1c58c683e03b24af72bd1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581e4bbc635bf199e59bbad0f9144f5f9
SHA1f1f158c161b9d62102a09579e76c4b40b37290c0
SHA256118b76cd1798848ff0cfaa05bba043d5736addacff3098136505636bccc041cb
SHA512a9950835ae3d9a4ef5df85a2fd6156eecb331020bd009da27b74dc2f8d07eeaa6f26ecb87bb650850a64895e2feb8003e9747e8b3e34348fd348f41971c481eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592334879c04c6b2d297615686a51087f
SHA1c02a6beb76ec884f80e41556e665709977fcef27
SHA2565c0a12279f82f635a61d0c6e6de38d630a97d9d9af025281051f3579fc4e6d05
SHA512a172ea51d4fc72663f58a65fc92abd1c31d9e61d173525dfe5c94d11b1987e9591f4726ad9355146e12985f5f21ac967f49ec010abe970edb84068419359747e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a11bb1de0f77cfc5596dd8f51e8f779
SHA12064127915dfe0f43321503cfff851ceb24c2b28
SHA25636b718242362861bdc9f27978f211741d49df894a1d734eaecfced9122d12b2c
SHA5121b7a897b0d78a9876df5069c1e241004c2438af16868d52d731ac26aa037dea4245c2fbf7af72a3598c108bbf779eca6452ce3b209e3817f3dfb696299597e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3c32a265babf952d01eef3837411e20
SHA19277c11b1ba429018f442445b397db64748a8c6d
SHA256c5a4494e7363215ecc5d0773ff55f6aef7559a2b8805c7430433ab713c7ce22d
SHA51272a03d7d7a214b9714b27c3c4516191e1f43e99d4214d996176d66672f0582c8d14635930f425a56817c49c87352d45ac8a865fc04c4073332d564a1eab44bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4b6c3247ae91c52dddcf6e3d665b918
SHA16cf0ad1e77032db5d2e3d413d45de9cceb24624d
SHA256d8bd8c458713475e7718cef0e6b92ea89ee3151b29bb0c8605c17c2510e58836
SHA51215ca35fec723dd0cfec2ac46f88bacfcf906e7ffbd1c605e100ae16138208f779163618f3a60f36d6f7b416867a3faa45e32118785d7456dabd24cc1339cec93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53943a0ec3733659501b9d7a806643d2a
SHA1154762606ceca201742ded814246d57a2d5f7190
SHA256b0adb9637b89f8bc02c7e25e318251108ddd19b846178e4245dc793f56cfa77c
SHA51229abf17e89391f9b490f7b0b851ae758211cf488a638bb743eb27814c394283754c64939845f45c3f43fa35f4b8546e4de85d7987f0819a6711d4d8e0b2014e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5015a5414a4a808c51682833c57a10d32
SHA17c842cae14a7ad6be89e9b03fc5172bd9b339488
SHA25646546aa5f6cf41aa36bd2a2272104b51fa6084e71e2c0541d996c38237b452ed
SHA512964e499f29211243dc65909b39b5d042e6a3727b0daccf88d3a78a8cf096fba00103cc6a3500df4e7376e313a79dc4e35b215b240eea7f2ec92d92266efb4597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541b1b0b08d65c6a74d9b31d29b097a40
SHA1d951f7d76dc2875a5328b1309a912fcd63b68e3d
SHA25624750a8551f485f580bdd19d515a31758e9a5d2950654e1cb3ce72a2209e1fb4
SHA512fac3fbecf64fa5484e6b83d6f2318ea0f163c30c9ca1c90419af2827b2abdfd7994ba914f43b7fe21e870ae3d112fd71f9a934a786ae614181469470e9cff7c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed5687ac41ed587532902729ce46861c
SHA13240b5adfd476c5ab7e020635e5abea7d12663f8
SHA2565357b7fa515ad88b81858a5a6520117e12165a239b6119fc1d6d263282a1da8d
SHA512c41d65ec90174ae82a8a2a82329e03868a81aec7ed13b207a9cc4757ad0b8775ccd26c75389cada3db1dfdc1a23a56acac8b8af5b791d61149ced16888df6341
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b