Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 03:16
Static task
static1
Behavioral task
behavioral1
Sample
32704b7d33da9164c1fe9de827222f84_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
32704b7d33da9164c1fe9de827222f84_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
32704b7d33da9164c1fe9de827222f84_JaffaCakes118.html
-
Size
192KB
-
MD5
32704b7d33da9164c1fe9de827222f84
-
SHA1
ec00bcf5ce1493e638d444eb71aac3b4e9e2c04f
-
SHA256
6610c71283b3972de637c915a354b4472fc01f3a8a92df0db69ad30d4f1ad623
-
SHA512
7dac7d9e14d258f552d4035c406b1f8c52f579452d706f9359654fb583e1fb4702b99c7339227ac141ffee9b468043288499ec73a7c014a9631466b9ff0efea0
-
SSDEEP
384:kzjqWueIrQIHeGSQg5+YTBz7vj3h0sepWOaCN+EBVxmXVJlFlpgwHzaplfLAHWD0:kzv8eYY9jbr+iXVJr/gwHrTYj0lZV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307ee1c151a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421559286" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED3B5C91-0F44-11EF-A759-F637117826CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000009c2cb1fb6cda1062a7b53b0194c73c364634817251553db7872a64ab1b92179d000000000e800000000200002000000025074e5f8c3165067f498c6c9ee1c471dc6edee7906cf04ed21efa896c8ae97220000000fa50619c51776bc21f116e701af5971fd25171bf4f879cf6deb050bf3f3ba44d40000000919e63773c445f013815ab07ee687ada4747800dd4f3af70289ab6bda6ca373a5cdb2f643b706b144cfc4ec5e2cc72fc1316f538c6b2ab44ad15bd76c22611e3 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1700 iexplore.exe 1700 iexplore.exe 1232 IEXPLORE.EXE 1232 IEXPLORE.EXE 1232 IEXPLORE.EXE 1232 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1232 1700 iexplore.exe 28 PID 1700 wrote to memory of 1232 1700 iexplore.exe 28 PID 1700 wrote to memory of 1232 1700 iexplore.exe 28 PID 1700 wrote to memory of 1232 1700 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\32704b7d33da9164c1fe9de827222f84_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1700 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c08c23e619cb3e78089bb70ea244be0d
SHA151834def14996489bb5fa1d57f0aeb080cb60fcc
SHA256f7685cdd32e08b96a1132ee22b1fd8c391c01abf8382f8353bc1b971d278b0f6
SHA512ce3809f21a963e2f894224fce43f2fd84c9e6d1eb952ec1b88e6758f672c9569ec6ef4de9315815d3155efee1cad00171a48ab1eccfeb8d681b89cef0ba81ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd16edc82fe02d43a5fd32ec38f71e3b
SHA1b588a69c1a0d623bbca7a50140b14698594728fe
SHA256134228a95bd28db8dcb6e2ebcd1ba8836b658af40681f6b80932e320945e377e
SHA5121679fa48a3d947949d9d2758d4033e202342799b8202b95bf635c096c4aef5bc00e2e3c0a4be9071f961ba1836ba3827f1cd0e901dd523dd8970fe477f2109a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9416fce012c4618448a3c4dc799fb8b
SHA1ddea3de465aa27e7ba8adb348538222f7656d5b5
SHA256560e9407e620452aed9cfb6accbb953efd3a47943dc0f7d91ccd6c1e1d210559
SHA51245cd8994e8b92714ed279c1ba9596a82b61fe5b98753b1a151af0345332e4466df96a533f9ddc4bfd61aabd5b51a794530cd0b1ef8fadfb1bc5205b3cf69a51a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579561fed31d5b13676a9b10bc6039df6
SHA100bfa5b884c3aa6c6908684f395eab1adc534398
SHA2564fedd064fe0a429b3cb082d2547a75f9997d406ecb3582b7ae204e31279a2caf
SHA512dec4fcf881a9533de73a4274124b6e01d9bae48a31a86eed3f2b7f54c17b450fcd517deeb631e886ecf4bbce474932263af171561003015a8c0d2d895b2883e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c32a80fe33457122e6b7fe7db4b2648
SHA17fe5c76f90862bfbf3dc5adcab16c26bbaa15aa5
SHA25665c2639065b892e188400c95db191c17a3e86f37525d742fcdfe79ae41de4c21
SHA512776a8d2d5d92fe999b7f1579813a10f713829c64b3cd8fd5535fd00d7d3fd7c5d95b7f8689576ea3502497d8080c9a635641ea8a0501c666fd51794133fa6a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d220a470b4b248bdac1b47cac0e2b0d9
SHA1712f5dd640d7b389dcab4790329ebae8ee138f8f
SHA256909a1a9d0f5afe9f4ae171b34e6139f0673c36e4ebba9482f3a6ee2637cb3a54
SHA5123f024171bf8aef1c56df5a2eb3fe26917fa4a7f89b758e6171882eaf5f397c82aa80fddb0e6e7955218b1c1f336646ccf88ccdbb946bef5a6c3d96601962bb08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f556c6535575f9c6848503ff1d96693f
SHA1d844b5866fc54a1fe996bc3eadfd448a93e0865b
SHA256faa4192a4c27fffbd8222b04da70652b95a67e6f0a4c02c11094b992f9e48cb5
SHA512f323f26b8afdb3b8d8f13e3df6dfba28f6797f0d45c465b25c5559be26dd355f0263f7051a426b2e2a7b45fbdf33a3710d05f6d8b04724de96f1199497f7d114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5942365cbebf08b7527eb98cd157bdf28
SHA1cb5915e8d10c9631e14a67bac739800065c9ce15
SHA256c75adc5331e47ee12705f51bbdfdadd928b7e8602ad28a336a92e880101fc0ae
SHA51231253db1f61db20a4574c60ab2da7db537cde1a6c2e8c943b2a1d475c0416db33eaea56cbf6491473b12caee28453adef8d09f8059cbe470553c2bf9431bbba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550853208fe4a09c10747824f25167f01
SHA1fb78c2ebd122b83d58111229416afe677f333bd4
SHA2565c7725ba33e8b77f7c36484c533321eadb56482553592c148a145f18fc783d2f
SHA512ad08cf839f7438971bd5e366610b02eaa4b46858418feab6b776416ef6e7924393d12beb3888f9842180360048b70a5403531239e7e38e8ae53b00e5cb3e56d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d941956dfb9b85a530c237f9d192d72
SHA13c33135c2cc87bebe8046024d3e8d3391ae5071b
SHA256c01240467acdc6b4f07c0342b0d8425624b7c26d017fd19bf55752d0bb67f7b9
SHA512860398d246093e929c9c75b5b30077d89d2c5cdd40a0d4c6765f10d626c298748cd4fec1c836833e34247e832411f084a1518c3fedc5fb9fc1e616a4e02aef4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f13375df259c5f814501ec61708a3fe
SHA10d96bf7b851fcd29a7bf32a816b63d110cf04da8
SHA2567923052fbaa726a814099b97c14d5586f738563e92aaa3d5e860ecb04d89991d
SHA512c0ce530f48e171e3e46d31782daa4d0a798e675390897e543338991209479e1445151f232e3a049a65741fed43d332878578ff2cc512f57bf9ccaca04338c142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54da522ddd271a079fe170005e2b1bd8e
SHA19c344a6ed6228b5cac9466efe7e2331b3fec9208
SHA2566f548e1e8136ab1af1069791edda043cc39d4ecf2e781fe1a34f68cb42e63426
SHA51287e41666bdc99fbfa786e4eae4f5051800a8092614bc26e8a2dfd8afcab7d9b26e8fd76026cebddf0785536cc3ed25d7dc198cde717452050b67e3827e0e2c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51895ca49531df12889c4a4343ab4e996
SHA199dbb1d77dc969158b34d97cf4b81aac5fc0d144
SHA256d89aef0f43b78989749df497323a48916961d590e8e0420d545978af6a31f43c
SHA51236051b2c046b49b23f7ce8192c71bf3d20d83fe4e8fe212451d135b03c7cc38582757a8cc421076c04dc8ffbbea8a1a7095d3d3d10b7506c7c616ff45f276f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53255828ba72e3a05faae27078f425fdb
SHA118c8aa390186181622526325556e444feeb3da58
SHA2569a82ef5018af83ad3b314d8ecd730c7836242d7fec5212dd792503b12679b85e
SHA5125bb0726164906b8df3b83f6996d2bdc8a9525e5fdcc415d755f7896b12557c306e22f3103085f047a1b1c372ae42fd6a22be138c061bc27cfd1aceb7a12c1281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bb3d57bb692d0b93f0a19274d44d760
SHA1f5d567c192e0481438681ca5a31779d5ac7ad92a
SHA2563104839a64b835a8eb6e91aee218832ac590ced615e4eaf84fb67e6b62cd87bc
SHA512904aea79824261d0a7b719ec5b46eb4e4f689e5c776f2f8f4e6c12dc4d4adc873ce882c8f808c2963385ec8c1a6a02c76079c65cf87449523cc8f6ada4c0cd17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517f078c299e64e68b399bcc055000b09
SHA188ca5248148a33ea910f2ce76c8bfcd45a7fb9fc
SHA256a5cbe47e09a97953f518d07c4784edc2004a9a460f5ef20d6a8557e00cd23a24
SHA51274fe8e344a2ea7c6301d5840f68d05e9354e2254d7c00e5f33a5cab49820ab984c79985b57ac121978d4b35dfdd1150adb717ff30d901bda00eea7c37f363875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514ad50980266e8db2142fa7fc63cec75
SHA16cde72ca2dbf75345a6654ee867dd02db8446522
SHA25627a1242a0218c4d32b53dc11b7d2c1b909d48eeb3add07e045bf00d5e22ee51b
SHA51282ee6f0f69c34a863cdc3c28bc916ddfdc64792d91048ff3a0cb7d6234f00fdce98bfb8e80903fd6136b9ebbb52c228fa6b47ee865acb64d74e8de16de234bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db6d479251d44db80a927eef12557be0
SHA15c40a932d17ae2c770a46db0baff9cabc84ae314
SHA2566522eb079be8ca41e75c75b1349ddf3efaf58af32ef1d8a1d0e251bdec6fe47b
SHA512785f7de9699037ece391036af73f3b13531bab86abc2389b8f1e44a20e8468687bfa7df8b7f4472bb951afe5befbcda783b202b1c703313f662f3c2e4d5013f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b7442e8e4ea18854b11bd7bbafe231e
SHA1a67f48949da460dd9dd2cfac5f0432d0d9367537
SHA256537925483dedd9d81ba64f7d45e53d829ea652ce0b0db2687c2a8e5a126997b6
SHA5123d806e5aea3753f8d36a2392c61012a91f0910782f503f7b910d0d3b6cdc1c5bf0507ab47688ccad3686dce154507a9d906a5a3c4fdf51b67aaedbd35c5adb7d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a