Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
676f1b32279d87369422173c520cf0bf_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
676f1b32279d87369422173c520cf0bf_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
676f1b32279d87369422173c520cf0bf_JaffaCakes118.html
-
Size
69KB
-
MD5
676f1b32279d87369422173c520cf0bf
-
SHA1
b76cb749407769772226182e0840156619f70bc8
-
SHA256
979c57fbe76330d8c40fc9c4c2411c46cdddee7c5779c75efca42ad5062fafc0
-
SHA512
704bbe58b34fd79417abdf56f823c1684cba8db0ffa25d17c959b182caca8705f0555b51bf0737cd099b960e5218ef451f9267017371b224fee538cd19ac9a96
-
SSDEEP
1536:gQZBCCOdk0IxCUxajXAQ7Ema3x3PF1uo6QvgA5+pJGv58c/szZJkF3ttDiVRFoO+:gk2C0IxujXAQ7Em8x3PF1/6QvgA5+pJ2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{526B5E11-48EA-11EF-AD83-5E6560CBCC6E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000098a63082c78221735fba99afa983187ed3a8e5690cf9a91b20fe814e7169aa09000000000e80000000020000200000005a69b0d45b5fe71abca1b970eec134ba7f5223ebfdacfe63c0b231d4364c56c320000000b30a09c10ab087cfcdcb03e583b6999a5fc635a6272d917ff63149eee33548a740000000d617b2832336559ce652254f16655d58da51b734300969b05df145b800a6597a9f19dc547a13a4875bb1920e3feab6f70a9a51811e17b2db46da11f1783a51a8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ad3f2af7dcda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427897539" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1988 2548 iexplore.exe 30 PID 2548 wrote to memory of 1988 2548 iexplore.exe 30 PID 2548 wrote to memory of 1988 2548 iexplore.exe 30 PID 2548 wrote to memory of 1988 2548 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\676f1b32279d87369422173c520cf0bf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d45a979c0ce025a36d4ddcac59dd628
SHA1d2c1375c4c135ad6674c093e0150d04042387028
SHA256d18298cacc13d61497c5f2b73349570bbf7bde8226eae29aa5a980407209b293
SHA512cb81a23d46a06be5548166eb60b6902ca7ad6d8d98c7c2b6458b33fb22b456ccd86fc54238c3d25c2f6a67c90fec3f62e230f12a23eccf7077de50b1e3054191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5605d4a19fd57908cdad1149c48c64a25
SHA18264417900a905029ab8008e48afd43ffd511b6a
SHA256a9cd434802d42ed675c4d876dae20db682571ac963d576dc20a2eed2c1025111
SHA512d9228c482999d2e97319cc4ee5420148fc9e4a0e5456a9d883753e51f1be96c11602c21ddba6e285f51c0d8250ed287bdff7cfb7e792e75a5f8f826ac323d3de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1547739eeee3440d9bec79cb9d5fcdf
SHA13e5a9199392b53fd534b8c9870122df14c46887d
SHA256c1bfe78e6fc317e40b4cfab37cbc12df58d2468171a6aa0b77188797b7b475ef
SHA512a2f9601ab0fc6c0ec5834029ff5f5b7863ac5022510c8f0b7531cb8bd5be70fb426e446b8ec4e7db0978aeae5c9af32e57b1d9169008bf8eb66d479ff68add75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5705a8dd2a6df190b0b0cb8f5f8b7f8ea
SHA140df15ed0ef9c7ca0343de112d4b79ba2e1bed9e
SHA256dd48fcb221e34ef3ff7c2eb080a879658716f78d37d0ed062948919f4a21f7f5
SHA51241e9033b0ce58dc0d892cdfa61bfcf9012cfd06397a829ddd55e0a1d8f5d85b0e60e40a725114c99efb4359d78dab1b43c280b930879a5aae684931cc109347f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6e8a09494e78a688f1e82aaa6abcc72
SHA172afcc6a1950a770d49f2e7dfcb001c2de15f523
SHA256225f8f535ebe1acf38d9e9645b5d90648b29084e56a0f5976514833dc445150a
SHA512d9959fc70ea03d6ba45a3e5ffba6016b7a3b99e144bb0a5cb4216ce76fc7804c97ed965e1f1239775a369fc1889858bba0395d0c5c03dde85f82b84a876ddefa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de7aefa48c72b53d8da740bf23a5275a
SHA13a2f7e59b13598544c1494b36c59980a6bf67f15
SHA2565351f3df7e987695445b406f63f57288155a7b754f8ef0a54259c5f2e283b65c
SHA51285704743868184bc5b912d65473a9820be57a46ed5242660a7af8a962beffc471db020f04f7aa1812f14e621828126df0a5e660b3f3d6d29a68db52613c6bc05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe902d3444bc17c31e9de92cd8377a2
SHA131519e374d086d417a101a396488c820ef49a09c
SHA256ed2b43c0eb3304294ec275a0e87b14c441b79c6e986a715ea49174ab32876fc9
SHA5128fa8b64b788a26d789a142d405cf7ab79bd747d140e41e2123f3350e5dacbd20bf849629fbdcfcc7ca22c0514c5ec2d54b23d5d3f8100ada6a22030778f6c762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e79153680506c74c8630d318aa20fca7
SHA166fa800fb62e45b94921c5754e7d563cff74dc83
SHA256526652ffafc33217559f02c17462907c4887baaee3cf7c0b10e69718f5a9fa26
SHA512b3b64191679ce0523f245595258320aaa9ab7bc59f5645a8a339f2c272be6fb400bc3b5ea7e884b1ddb9b5a3fa460abb3ee9241377a0f741477c0a19edffb390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fcb7044c59bcaf85fc033a9d3202550
SHA1bdc0e1edd5c8492f4f7b7c4f2baec74c11894463
SHA2560813bfaa5dac4ef81b992f35dfb2191e4664bf9d2a190babbd2ba2cc23278812
SHA51288e73cbcf979dc02c5bbc1a563e8193a21ef274523bd579177d6b28c3b2d8671b74da46217d0ee8e9f00c151a0670efe237e43b530346cfa5570c5efd885febd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3caa69c07030bc7e829c1b6c533c490
SHA1c1cb28fd1d141b001f7ca5fc7127f3f5fecd15cd
SHA256db858c4bbc6d69a8ac18ff7bf308a2b61868aba32fe9cac26e41a5cbb3864f56
SHA512495c64ce85c0008fa67d0877cd15776e59d19dc266e3578d870c235e72c3020896e37e18dfefa2816f166fb353656e2197bfe572066bd9cb144ef2ce2c332df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56094f293771bd4c7c14bf087b0834d5e
SHA15018bf8b753f379ef03bf007c6b892b73e209d77
SHA256b8e418ae14dabd39bc147c1cb4b0cb73a9a3bc3284bc143eef18acbe39b80b11
SHA512233fdeeb7f0145ea2bac2f072c5ff8cada91fc48d526b3514dd26497ac6fb81c3034bc0f05a5529b998961bacff40217cf49411df9ead63df0b93dfc0c974bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee811d4948655db9cb4bfe5eba2a9ec2
SHA10440253bb4d2d88f3aea8904d6508b64057f3101
SHA2566aecd6cbcd24036caa207b40472e51b76b2f05c341c4db361fd02dc89f48036a
SHA51273512d619151b7bd9a95993f9a47371c58f1be4a6ce92caeaf05b391ec57f851b26ba9eeeba7cc8ade95b690ccf5c99349fc2423fecdb513dcc431bad4d46ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eff063cd97a17b3c7dd2d338103e52ba
SHA140391214efb9903635faf854be5fbbe3a646326f
SHA256801c7e01ddb2a4fe2bd8e5a0e1f6e769c7d859b42f076eea0bb1dbc2964ba370
SHA512f0500591b8e4a794e34d4db04929d8b815aec81419e5ad5a335b07163a46adf63b12780ef34ad3c5da9ca8c55989ecaf15a636b1b9b6bf7926e678e3dc7ba983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052fc7a73ead06d7314dd3696fb6ae5e
SHA1417f7abef03a149a263d9ca48e73f3de72e62894
SHA2566eece9a7c29fce6628537675382830a810d4bcedf2466bcdaec7cbb2282a2b97
SHA5129f90462bcd63935113847b9ff2c5d2f0c6fbc7db01803ffc574b19e7fd14fd50b746a366eaebf63a89f393499dbeb162efb1854cc37dcce870a3f52d7b3f3a3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fb49b84fc0c50a59f9e93af2ffd696f
SHA1375c141dfb4e043a91ce7e4a9c41893d5f317cb5
SHA25671d79d60c6572ad58ef9e23bcf281feb7f239ae6f2dd8ff5b05aae549782a207
SHA512f0d2ad66ac8b9fcc007fad4c79aaf41835da7a9eacc1c28c736090b5cd55e085473f3d315936eb6a829f5e5bb3344ccae1af8495bafc0cd6dd11de043b5d23ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576f4b27dad42bdd39cd7c609548d55c4
SHA1e83a6e749a70a1bd0085b43720f538830cd07fd4
SHA2566cc9849bcb34e0019d60ec5ab8942fdd0cb1bb6308e207258d8663b3281bd73a
SHA5129ec8e2ac0bc93cf3593158575a0294269b1b3ae794cd2abd3e0c71fc90a21368fb4a70623917235eb4cfbd152924767f9cf02d300edff422f6ed8ba246cbf550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f419d2dfd85621111718ca94d75a6b3d
SHA1d7ebe1450611bf1fc047e229fc3ac2ecadda8806
SHA25605126c0e508d577bae148d2471abcc55aa247172c19001dc6bac5b31944cfccc
SHA512fc7cdae092bd8212227a887f42a6aa1030df2453f154e54c521b572e63a4c8fc45aaab61746a9110df393d1f58899a31734692fea8dc0009d410ec84f26c6ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de7354264e03b7b86c2967e64e0c0f4f
SHA132f7985adabf6b42588ed48978b376dba66471d8
SHA2560e8198707caa8abc44953e69aebff74cec26aaf3ab3a737e83e32d7d6e9616dd
SHA512de287b2d0d7ee622c39700c182d7f4789a6a181956036f978bea72eff70d7c68b9dda0468b74a6794f6d8fd3c12942e84d0015cbb2429cac33a21ef6e0407668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55889bfcf59429b088639da3144333739
SHA1b991f48e76072921b2fae9a6fc4ad3da5dbf26f1
SHA2569f840dbe030e01c0d90d212f713b65e88ea586b57482de5e194553cf3b5bbf14
SHA51259ba6934ba6a2b886ef75c00e140e9dad4b951a9a21832f6fcc46922735b98f1a5318d3097beab80c6a5f6594ef01b1518f8c0ec899e628ff6994b8deaabff71
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b