Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 17:54
Static task
static1
Behavioral task
behavioral1
Sample
3051f0a42bd77fb68dc1d59f7eb037bf_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3051f0a42bd77fb68dc1d59f7eb037bf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3051f0a42bd77fb68dc1d59f7eb037bf_JaffaCakes118.html
-
Size
462KB
-
MD5
3051f0a42bd77fb68dc1d59f7eb037bf
-
SHA1
cb2e034306694418742f64395f0209759a8f9b5b
-
SHA256
dbad308348a8e38ef446b01ed337c527995f736039799b69fb6f5439440d8e35
-
SHA512
201c9d767dd6011e3c904bfdc02d132f9390399b609b7961939ad27510757e137514d3bb6d0db0bd7aaaacabd751319ebc6a06c2ab0dd2743f18dfbe3c38811f
-
SSDEEP
6144:SgsMYod+X3oI+YhYsMYod+X3oI+YMsMYod+X3oI+YLsMYod+X3oI+YQ:f5d+X3jm5d+X3I5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000e846ee136a8201c7fc8fd56e902e5c218dda58ea2d8492b47f2cffb45e8623c2000000000e8000000002000020000000507cfbd20b6972a6b4f5d15ed722e10acb99b7c2752b1cbb4e8d48212dddf63520000000acbd53c6ded33fea72755db30a79b032fa4d7f0363d70b5466e19fdba989d1f640000000157df7b8a7bedee0ad9d9fa67f3565515fc740fddab548ab74cdda690948b6a3de58e81e277ff06f058e1bd1d9b9cb68106345bc8a57e5c7f362a932ec95159a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421525545" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a01f3703a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E9BC811-0EF6-11EF-A9A6-4658C477BD5D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1736 iexplore.exe 1736 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2060 1736 iexplore.exe 28 PID 1736 wrote to memory of 2060 1736 iexplore.exe 28 PID 1736 wrote to memory of 2060 1736 iexplore.exe 28 PID 1736 wrote to memory of 2060 1736 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3051f0a42bd77fb68dc1d59f7eb037bf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b11b344bd9df7722deabdb5012a3422
SHA162f421b4b925662b07e756df5dbc4bea3662e650
SHA256d1b1141b6ae826634a65596f64c1cffea8554fff334a8fac939131915cf7e342
SHA5129852f33dab5f36cc7ac5e801f2923a34eb96ffabf2921e34dc199d3664d5718e4026cfb515e863579424ce00a95a83fa1d924f17acc26548b67a95f5e09fc071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549a5cb7a8f572ac27bc38aa5827d051e
SHA1fcbbce711cf2a5ee9d3aefacf15ff07425d42106
SHA256a36cd31e703585dfad437ac999d7e8d9f31fca9f2a9247191a0a1ad82151d0f5
SHA5127aff6552465ae524066d398d2be8c7f1e2c9e84fd258c2360a8e4c7495c54f55630ac9e72a3be26703dc23826dc3c10bd30da65a11cc2ce8e48d891261b2b371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59508da588d1bc3aca2da51efa39df2b3
SHA1b34057ba3ee991cb49c4d09bf5c2048d118fca5e
SHA256bc2fa0479081d575b8e63e18c044bdbe6df7eaadb1598a0ba60bfd7c289e3df0
SHA5128ad077f93f5f2213f2320c502216ff8fb42af6f491a2ca30b01993a7d16dad92540658edc11ef67ade3290ab644a0d55aad0c842d0a0d2334edf322fa041c840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a96f35f089f7b7bec46e5a22b65282be
SHA12d7b411e875afbaf6ce9f18ed89b2018111f5ad9
SHA256650d6d1a2af772f3b0cf4d4d89bc6f2eb4ce7169147881a55a8014f792b81d01
SHA51275049a400a73883d5e50d88fe8dfcd1ad7bf3206c0184f9a9863e1a64697c9a98d2fd603922dad929b58dedf4fc170f8a29347a1ec39e94b05407e8cd911edf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594f3f232ecaf0b13904cebee0c118337
SHA1a2fd7ed5b78e2852c720b33d48f97397d471ef16
SHA2561892311322864614ce3fb6383d3cb6e9377800330d8759e69d66dd90ae165f60
SHA5129fe052980fea5cebe31d67c468c1a2a299aabeeb3e9b1d5c1eb516cad3bcd954354e31ff425f9b3a5e3eb78a8ad115c2c35589a8e322aab68f4ff4f004c6b5d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae252907b0786a514c0caf12da78e097
SHA1b16e6830b82eae0485da1077e6ed9e2c26362c7e
SHA256353d4c7acf388234f08df4c40e1a7b658cfb75741e9842bedcfa874445212941
SHA512094a30cdabc9bdc871051f1615eaeefeb48bdf62ac01952739af01638a47469bf998d90396e5d85ab314bbc0793a7211201233b51a3c64d57cce026face4f7d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ab44a8ee3e0fbf169f0c2b0730dee81
SHA13d1f7b04434b2777075aeeebbbe4106397f1872b
SHA256cedbd3e3445ec3a2eba9a6c8a9538f80c28c9ebb520946d1516ceda59ed633ad
SHA51253e11be94e81d151ca74fe58c2546082fa313ed617a79710500b45fc8fa766f2375bde5a9192e49b5ea8dbea8fce8737fd3ccb58e773013a68470fe79386f814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0b5b9f75ebad4aa35634f67eee05e16
SHA15ef1e20d54e27a6271fb7cf5f570c795e8bc2b77
SHA25668812f2a2200e6fcd1bd3668be2b8e986c82b327893d3eb999f5086b1a393901
SHA51218604663ba965bf0cca02aba1577ebe83dd05b4f19f6f8a225a75dddd2c0bb9572e3a39d5601f20425a17e0fa00ce2bdaa2202accffd147324a71f2ff17bb511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cc5064d6208faff25fc692cd0465bb0
SHA10edbb2c0dbe4cda884a8c4b18695df1ab9011bd4
SHA2562d1a7739442b77dc3234577042a09e90c763438d8284cd329509c7eece29b75c
SHA512279baae1981b3a633cb21c8db7457df2ce691c4c9ca0ee1521847c67d1a3175efec25df6073a0ade7560d31819f985aa32a8037e185d7ecc13718d6dd96a99cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bfdd87d7bcfe0a33e80448aa8f9d1ff
SHA1ac12bde11b5a7c9e9a249a577f5f2f27a45d5384
SHA25670f898e560898d4ed09e1fa1ca6d816100355ba13f438fe68b387c973e1349df
SHA51208357b9bd291af3d39f6718ac0fb3722f0f7861b045e23402fb9220b2c3f48aef1ab09f45a14d71b1572e7060551eb4923dd33896ee0afdc23890c3f952eeb6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6167f25a22dda4de9a9094c94bd91ba
SHA1ba35361440af0a88d8585952424e9302a67d7203
SHA2566020e16d608269bc4a28684c71f583305638f4093f59661cec4cb0cdc872f6a3
SHA512570d08165cc7d9b0051eb59a88edaf5edc7d31e810e40723e114a084c939cd4544726482bff09b2c9cbf73231a7a1283b469fbc4a43a513ce86216f538dc4265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592c04082dc21f42046cd5d7400a0fab4
SHA1b548b38938e5c0d20e549c096b812e0fbb6f5eda
SHA256384e82b4b0874aacb58680eda51bfa9f8cfb15b5caa1ec8b8e6dcb97ccf7b3b8
SHA512f12273141157c76c9833d14dcebf7a146002460d90350396afbbce8a2432ed3dfeeead025d46165d3d75d4a18ea1c6213f99c58b656b3908c07b683fb73dd46f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0a1c2a5b495cf0e2da017ecd5398887
SHA1f8911e1b269c2f223bf3229e5d98c03f7ed0d642
SHA2563671b89a40800fa691430e249ace0026eadec1c1014e6693391e20c905bb4fbf
SHA512ee35b088529adc3373fac3781d54da785318d893230c373d4de4c3b524021dba104e8bff4ed44779f0f322290630d5363d6612545ccd29e9e5bf62c2729a7a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d105a6c32d1c724273cbca02f09bc9a
SHA198a589d662f301366eecfe28b97029f74a49ab07
SHA2564d302246d6c0ed6a687aee22e93f7654e241674bf11ad522f94b470065eca1a6
SHA512141128b2e4d6e3db4839757501774930c74daaba7b095a5917879f582138eec23696210b78d81e408dfe5345364c183848273abafa949b3637888a3d66c392dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5956fc3cbdd9cb73e33570577b0245d03
SHA1902fc905fc6c9efe85cba4c9bdfdbd5e42fc6c71
SHA2561d85aff50637bcae7e914eb25340ef282f8741f47224ba251b2fbdc099503fbf
SHA5122b9cb1731994e780c62637a1e0691ff92a939254ebba9bed452699fb5f157747e6b582a40d3aa6dc7f8269d5a8f821625d490629afcd0bfa613d5b648c02277a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a6ffe43aaffc148738c8dcb4112fe2d
SHA1e60089341bc04ba5cef634acceecbd4c06c5e388
SHA25666721a0b8d346de156af46e6e2a99ae482fccc1d766630facb26d9b6271832aa
SHA51236c27c794368ca541e632844359ebf3945ffff30c98702c365d8438b90954791b3085bc3a29d5987cef6e352e4fa50308861f61b26e5fe3f593136691f503665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eee0831f00ae23d55022a91d5f379e50
SHA1ea1056a906cec1676e43992670dbda4e3ca5cb90
SHA2562541f2d672c63202f7ff32a6e919eeebdf79eed5aa730c8093466c102edd883b
SHA512cf7aab7cf26f228df97eb0cf29a3760931a0a8b648a68b74454dd6cfd57415870d77d99ebdcf7306683f64246f807361382a4fe7f75cad948e1e2b737b76c2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a77f46e640d96189c6f1ba2006a97c8
SHA1f8b9ea8bd429540c7ba9f1ae875dc826d6f3976b
SHA256adc584c1e2b0c1e2d310b63c0f79daade7cabc1b7469175adbd73bc4edef82e5
SHA512d6959fdc6db0e474352f8b1003d3834361fb9466b420e3537ca851e7d265a99524fd590ab28d6bb340477b8b91fc687942805c2a8a39d50f1660dead76c60c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f7527dd63b1e4caa4c8db0fd4c48d75
SHA19c0e4b1009bbd600daf115120c825ba0053da025
SHA256a3ab1d1e9c6bccaf299227f35d4ee28b3da35646596b742357783aa7fa959b84
SHA51235f149c6cee11df1696bf09aad0bdda4446bb096710069c015f92a1924f5a9e3f1d030e60db020ffe7b16b4c63ebdd3fb28517c21e0f4796a76c822ba1cbbecc
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a