Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
3177bd8640588c9d528143991a1226d0_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3177bd8640588c9d528143991a1226d0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3177bd8640588c9d528143991a1226d0_JaffaCakes118.html
-
Size
69KB
-
MD5
3177bd8640588c9d528143991a1226d0
-
SHA1
b5ac679c12200e13d59315a48dce5b8fb34b23e9
-
SHA256
b6c6def1635db541f70814eef6b7be1bb140cd8015c507af193f447bdf06b628
-
SHA512
eb2e8a9713efdd7febb53210e18e749160056c10324f5eeaa2d8603a84e9584c7cc6338ed9cde169f221d70bfa2f4086e4c20f4f6445e60e2a11893a32bcc536
-
SSDEEP
768:JikgcMWR3sI2PDDnd0g68n6ooTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVG8sB:JeeTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000a2db0e11d672bf12699606a4e90d56c6f15d1567afa8b7ec0a3549de7916ff83000000000e8000000002000020000000f2df4eeab2e810da64684f5d5376d7dbcf0dd2cebca32da4aa41831cf9a3c7342000000036d47c85b5488d346272d9f71b6e8a8f19963977b66aac50fcf62154d837e7d440000000b438d4af4570edeebc546f81bec8ff46124614bc8cd937d320ca184cfd0cae14fa144fd8cbab693742f8f36b392cf0fe42bfd3b13621945686ea542a26be83e3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421543821" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EBE8BFA1-0F20-11EF-ADBF-FA30248A334C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 708c86c02da3da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2648 2416 iexplore.exe 28 PID 2416 wrote to memory of 2648 2416 iexplore.exe 28 PID 2416 wrote to memory of 2648 2416 iexplore.exe 28 PID 2416 wrote to memory of 2648 2416 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3177bd8640588c9d528143991a1226d0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57de3cc811ea0169b64bf5855acaef455
SHA1353690cb2084f39557d2a4e0a77eb599bc7d3e46
SHA25682ed77b1f9d934609cb62396a04edf830d9144c6b5357f5cf2f32708bb1ae994
SHA5121e4c4c5108907639d6a3c71dbec8aa15e8d4823aab22b804d2624013f1cb7ff8ace3b1335125439791434ca99ed00cca49d53d7d9d45f9e48469f5b9f56688da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5506d1ec8d447d839c0a30a68ebbc3d01
SHA1efb9c2731ba95861b9342565970dfe7a56b3d2b5
SHA25613097de667c6e432448278e50056efde0d43edc2fe49369ec1828449062fe0ff
SHA51295681d14e18a822f3a7cc7f19047dc30a6a3ea58bfe3a50dc5b85580d6d5b45f82ce5a9e75a816a5fafb7f9a03d956637ce9977dad8d4bb695a763df173180ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51f998a93819080d94a390819e87dc30f
SHA1ddda5008fcc8e575cb225ec47b292c18916a50b2
SHA256a8f8a3a56e6cfac0e25c32bb8d42062f64ffe8b745f494f1fd74db33420746ec
SHA512164d77440d5f0f045dcc0d76739a3a6c618123e296dd8c30a032133d9d13e1e51ad209000f36ddc46624dbc51612e5928472257475f827a4f1ec905574b8047b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5977878cce7e0df7c756fb44dfe3cf836
SHA119d6ac5c03c3fd93fc9db6f9c3bfbe174c09190d
SHA2568af67c9678deffe60e1133793c980cf143c7bb2f8ed39953e3fad713ede45c81
SHA512c9af3e1b68be09099002a43e91e930f4007c1801733bd2f4d54b962976177ca4d84aa13fb6f8393606c2236b77981a2ceabf9293b0cd9b3054ee25627ff608b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50292b641d0d160b6e2addd0356cf4abe
SHA1ca33d6c96a49d80dd6ae7d56bb590851ef48d024
SHA25695e0310bdb319244e6a99bb76244687b49baf1652af0721fd1723dcedc04474f
SHA5126bdf29afe15f5cd19fe5d2eb1026b6648ba6290b3744d1f6e537c6cec863969cd5fa54dc6664f3da4f1c26fe1fc0d2ae160f297abeb26a127fe4b20b958f9119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5919495a5924fca8f6ebbe5772a7196e2
SHA16b479eae42dd7757cead0d40cde3537c3dc2214c
SHA2560f5d3e679f96f969c057c65f3f3d2ef4d9a17b20138c15df57539ddbd786818e
SHA5128f296def0af20813259d673c75ae101cbb096e654600525942444277339667142556d103bafa8f400c68b3bf9de1918dcdb62c6180747330d022bcca4b4c2f59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f920378c041806228ea40c2ab29a7ae0
SHA136eaa662f1e06d1045522096b89ce58d09254063
SHA25623e655c63211ab73362606c153ea277dcddc778c9f55f4a0e02011e33baf8c1e
SHA51270ac4d1d3c02e6e609023e05706c0a866904f70a13ee4d4538611f8988491dd741b0343546857784b43e839af7365939a4c96df8a740304df3045ce17b55edea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f6aa1779a93d98d693bdead9802de13c
SHA1c4ac4caef71ec25160561c99eef8e0aee0693bfd
SHA256c5677f15489bd5052582c45e87e65c1f8382ed3587ab78cf9eadcc374d5cdd2f
SHA5126bc984c00d664208c0d1f966729ab6134ef86acf5a9189c9e0ee9f6f39a571bbf5df872fc3ea5caaf78376bddb8aa4124797177caf2f33b1e7d3fcbf09683cef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD532be5fa3d80d60e0d1b6eaa329ca628c
SHA1dddb5302c33971085a947f0fed59276746b5e65c
SHA25698c079e2ed97432675752746fe461a1b04dae93511a3161426f6e53a656742b7
SHA512c69f750e6a50c51fb5d533f1f98ab703fb22ef3e1705fff9248de306729f69d441cec1aadd31a72204c6f60dba788be64552845c913eb741999b89e03b3d3f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cfd6abf4e25dad5b19241881c57fb7c8
SHA1f79d8077109b1f292cbe11fc8f9cb2fe5eac0861
SHA256adce92ffe6e86fb8c00cc4b7491acb095cef4a35d3c4ab1224aa8c2118d482eb
SHA5120749bd853580e18138cc7d74bc755e3ca478cdddd60fa1ca3e8866c1ce8a7c300e025ce2bda10c3c4d2369b90964364099d607565396856f4e5377632a993a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55f141f42f16489ef0afbf0e152edc8d2
SHA18798b6325fc7ac0b7fe4cd284e208406570b7347
SHA25663d8874a5ffd2a249b2b129a99a145b3e4411a37bdf00453e024662aa7673def
SHA512655e8d678218eda72a3772984e911b79cba2f8e95ed7f6a878457cc1d230bfaf33b4cae05f63f512a8e3860fd9c9ea9f92624a34d625a364c6f56db75dab9886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55f2bda13536fd68e72050c32976934c8
SHA1736af436fd2f2a35006bd5e4ef7b0e194905e55f
SHA25657d5a414cb6f09fa760b990f8b21dabd6250444e85fff68ea5b116c52789d3f5
SHA51277aaf10e266e4e10ce96d6fb3178082c9f5b1368c7742f92109b978cbd3e1cc87254c604f99d08363fa80d6f23c472856c592fb3639a51656577c5b7811f81f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD588e95b57031fe802ab2773fdc4e20ac8
SHA1014746d559a0cf54c50d69f4ada8d5ebdfc0c4d3
SHA2567a9779a43736801c23b08ec8bb4eb91a9ed40f33e191406bee05321ea2c8642f
SHA512f16ff4ee8f1cec0e8db26aa4ed23e640b7aa76678c3d755da87a45bf1bb80ecffb480469948929c5730c470dd9836d327ba83126054dec444e2aa5323b7fcfbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5362b1099745743c98d1ca9bd5dd51681
SHA1dfe16f8af9a10b67eadc836759fad5f5a1d84e9e
SHA256205ea8431530cc42adc7d693bfb3670085ee3d5f1e0a3b91bb0ae33ae405da40
SHA5128759622cd11fa08f573fce88ce3b7588dce3bbc3ce9161f7f0e372136ec999edbfaae54cc77b0a2a45f93f87d9dbfd4f9b79449ebe954f9ba8a6f5134da52111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f8d2e79acdd46270137e7a06d1b63806
SHA12312231bf1c2e08923d1db5855a3ba04948fca3a
SHA2565b4c60a00408b9103bcb65ffa56d47c099b53d0d6fe1595538a79d7ba6733a86
SHA51277a124c5faae7f70a264e7e3ba91668ae15c22dab9b08476770cd34a31b0f7c22ef16d29c4f5cb9be40a4d2f3df6f3f3670751631b089cc0520850db8fbbe797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ca7606f82ba787dd941fc4378e6db38e
SHA1ce8777707bb79e90b79c8e2772f5533ed60cda23
SHA256dce855dc3372cf72872753edef64492e2bd7b27c0c859991a2d31c32d7c8a632
SHA512d55b0ed3133f3ae20afa2b857bcb543008cc77900009014fd5c61dd6ab1096ea5cf2ce1461011c09e45bf1824deef3f4d9e487ec39c03a79e85adaa757a6c556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a569a14df0f5936c4acec9c49c4e0958
SHA1f565e30160e0c69894599868a0d7f93a6e1e2b08
SHA256a0d5474828dbbfd4b1afbb5de6c286cb48da7bc084a895513b4858b7e0795421
SHA512343e49719c4cad619105c877dc48601973d54b12031ad07a852e47491ede9f41213ad9d6cce588e56f04d5cb6e0c865c2a76287a8ea92aef10ad66e1837b2947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56592549dfbc29ed9cb2902c0080514b8
SHA1053b5acebdf8b02a27ad5945194e25243cf5c9e6
SHA2569d0b73b421c046286c77bfc83dd83e0e33b46f628ecb1ac551926173a15ebfa0
SHA51244d10ca35f21cac5e4d9a23494a50b37cc05c1309dd308b378906c7f6e2f5bbf3a423e56a504ab492bb490a51aefb519ad409aab8603de4866c1b194178ba638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a818d6c4824db3f113a2c886cae1d991
SHA1d416dbf7573e4b8e15d982390473f63a79c2c9f1
SHA2561d583a265ba79763a401bb73c22ebc9793ee53fb57a4714352b8232faf238c5e
SHA5122e32bb8dd4df56fac9cef6e4c2adcf43801352aca4c5a5f0e39891763c056276ac033b3907b25ebfe8b4c28aab3b43fbb758fd8fc26e8cd8731e6a76ba14d23a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a