Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 06:25
Static task
static1
Behavioral task
behavioral1
Sample
333138c89f4ddd33afcc0cd2c3f4f4a3_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
333138c89f4ddd33afcc0cd2c3f4f4a3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
333138c89f4ddd33afcc0cd2c3f4f4a3_JaffaCakes118.html
-
Size
37KB
-
MD5
333138c89f4ddd33afcc0cd2c3f4f4a3
-
SHA1
96aa856ca56470ec02a32ca7607e53c61bfe0f48
-
SHA256
04a12a618a8900035447173840a9277f20b7c173d043082b1250591a91a67466
-
SHA512
dbb58889dc4d239a18b12f597ebafd48f8a9328e41bbb23cf565fe43d367eb0e52133c7b5ed4ac3328d513402fda65ab7020e3965abc1ef0907621fc50a2b4b6
-
SSDEEP
768:vA/bVFRFQW81D4RA+vEOjz6rdG2Gil54RZfPGnf3Gu34aHi6781DdRA4vEOjq6hb:KRFQW81D4RA+vEOjz6raA7IaCC81DdRv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000d1433c1ceb41ab9b288ba00bbfe4160d819c9963b10cfa00e1688ad21cca5591000000000e8000000002000020000000e33ebfdc37883c3acfd81be670fde5ce0ad390afcb039f1c5d90596c9ebbd15d200000004f496957df6694738fcd2d3834c03be4ec3794f70bacc1252ca8df57bc2684c6400000001139f6f6572a9b9d51a606d1c3500ab4cd19b49cd55439c40dac4f28a1857454d1c1c3166958d7e8d07240141c8de4e1bdb89e82f17a48ec7d043257d019637f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3EE7D041-0F5F-11EF-85C1-E69D59618A5A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f8f9156ca3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421570589" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2384 3024 iexplore.exe 28 PID 3024 wrote to memory of 2384 3024 iexplore.exe 28 PID 3024 wrote to memory of 2384 3024 iexplore.exe 28 PID 3024 wrote to memory of 2384 3024 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\333138c89f4ddd33afcc0cd2c3f4f4a3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb5f5ca22c32e4b88ac16470e63e0662
SHA1dd205599d7db472f75b262aaecbf2cc7d9133d93
SHA256005658edd81f5ec11512820d3e379640d29e6fb3da71a114b11870027b45b0d0
SHA512b9a185446345977b5af91480e1b12c84b71a10fa42cbf8a514600c9c9d38552f028a4cb0e6f817d3b8ddf2b397c10c5ec909d09e3e411326afb19187b4a9bacd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590449f4b588679acbca1c5798c51543d
SHA19ae0e0126bf8417ba8a8f8e9c72625b9bd8f0d0e
SHA256b12921e56611af40eb2995ee58b20171e00947712141828d852f59c33b401ef1
SHA51254d34f043dcf2ea89d85e04d33005b056b2e2c8cd6d891d9ed9f640416f404221c3b74a4ac70bf0cafcf97bfd5ada57f57d854246f0dece6ca646ed4befb176e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ee33da8c6a13fdfd879b9c485c9bf35
SHA1a1e0f89807cdf8684205407bd74edf36b1d73903
SHA2564c1872dc75ce605a6a325a97e8291453698ee86d91319d9f1c5d04cc20dc775a
SHA512c7dca82414bdf9b367fe04ad487d82e379a4cc10336b4810612c068702c7a8e92c89ccccec7d64c265118007890de6e3f63d4bd758fbe57e2fd56716d6da013a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e232d29756858a5c1b4bee29d8df76f4
SHA1dd8f01ca1cd1c0ba10ff32832110e278da11a97d
SHA256824e11c7b2649b306450416c7ba4edb8cae9b05fd7b1009d9a0b23fd0d44cdfc
SHA512c41e0f5557c6e38f075a638a97e11c00e17a88a7c48fd1936e94bcb0e1fca2207f22cdc06cab668d9be48c2c085347d6396ee0f930b0205c35923c73d32ca6a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b688f95680ceec14912616f493aba790
SHA1b13b23505201e89dd370f07cfeb18d29152ea50b
SHA25649f29836b7d0cee857f8216957b2472906edb174c4ad18e8eac30a09c73d1aa5
SHA51233a95d9fa4b4baecf63024b0fd761809f0943cbf3f314ef3d69ceb4172c3223d255b21078c845b76c42fe500b7bc3c93051ebf838981655c0a0d51364b1f83e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcab05fa73042097927b2093b1c12acd
SHA10d21b928b60610cf1d0ba36ae69e2b31b74a2b33
SHA256940e6b7b7d19af7214b5be33aad952fa57f2e3e57a6183b69a26df348c5f9252
SHA51293d1dad3673e26acf874476f3b640a83b44758e079fc53484ec9faca3f283d30c2da8a4eb1a159b26a357acb687d82b3d2faf286aa49caf86b623fa366c53b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58988fe295fdc739dc2b59bfbfcbb5765
SHA190aee54eb0661e91b8cb4390e72604f415e167a6
SHA256baf67c8f32c76449c877329bb7fa73acbe8469a3b89a2c8d79ab3a8460174bba
SHA5124a53238690fd7d9cfa8457db6b43d88125e7eb25042955c1f58fa3bde0355484832f88b953d1a7d3dc81c2ed9f7c226b47912ddcfedbc2378915886324f985e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c47f8d98b4e8914b528230a196022e8a
SHA1e49e6fdece37d3e50dd956c53d4f854f5f3e02d8
SHA256fd4f20818de02f684c4da96fb5837a953b220efbd92438e507ea67732efc3334
SHA51231e4d14cb271abc7bb0425f9b4b6c0f1c56316bbac07d6a4beb1a1d1c421f59870001df2b218f18afea37d7c38aa409853a633038d11dc88c9cae6ff7455fbc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b488dfe7cf12279348ad0cd8e33be61
SHA181e6e851ebcaeb028cf436102638d6e092a1af5c
SHA2567df32a2a16598ebf635fcc8e69118e30d721709343d5ef585ddb328c30253dcc
SHA5128e2ee5379a42c31e38dc55f3154fde44aa03a1c91cbae6e6521fcb7814dc4bea4c88ed9883debf09972bff7ef2fe643e4a6cf060a6c598485c6898521825302a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5747c9737ba17b7b20437c215e58dab31
SHA199567b44824a9de70e2e1f6bb1a9717b1668d9f4
SHA256a8a4f895864af91bcf2ab2d5c660b6e4913817bfed01f0841537b18d9380df66
SHA512278c7f9c1ed603a2e807f0a5005797c6159ff59172725331fc6f483d5247f1edae02307de0a72692380449e18803f58a98a3456fa6ee258015631579a8a71bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595b28e4b47689c1cfd7a88bddd4de9c3
SHA1437c548ac4ef7b15595f4430f32c48694272c73d
SHA256c915db6b3f2f8fe8ad2c68b250f775a30b64fcb741239999a6adaf1cd888b622
SHA512aecec35cd45b15cb3f7858786242ed6ce37b7ea08b84ca4517a537fada6e687834e41c056bc19331767f82374eb2cb45080601448ef910f5529f52363d030de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59403a3e6209b70d0bffe192e8df66e27
SHA1bdeb535791e63912617f22feff3898c076140e3d
SHA256723a4a3d8f908c0a3b5ded50006d4159e425757c2c7ca8fa4d17659c0f0c3628
SHA5121c87e12a066dbb44d5530d726da678c97a0ae2ef6d4b661ebdfc692fd406b4a60688b20f2e489fc97ad21190ed8cb213af3a60732d829f58f314d3d2493810b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f036c5b98d57f5e1c131838a0d322ed
SHA14d15b3234454bfb1fbfeee73da204d31342edc01
SHA256ac9353de3bf3d2ac8474bc39b8ea4b5bb264f187303b2a834f3c8abedb013dc6
SHA512a5efe97e94277ec16ec04a2d401accb1587e327240882302483312bc947a539a06e3b0feddc7a20061963fa9fa49ea273ef7dea88a0610319907f32258b60913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f8cce710d0ad6820297a844ce66f948
SHA1e0a0f30dcb15be60c8fe0e1d52ab6470b713801c
SHA25662a444899db7f7e00732928874520f920f1ac4e8fbf8d3bb72e05a0b685c29f0
SHA51243a62b7075fc490b170452f4d8bd3f02422c54338e018050e044cab3d2779bb5acf15b47a69ec35c2a7192915c3936f67095ab59ba82949beae641e82db0ca6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539832d74af487f5d0a8400e7df39618e
SHA1b6a3617b98a7386f3ac1b64decf80f3eeaa1fcab
SHA256803735c3b579f6173c7b5411191d464086371d070d42ee75f3d08c7c7e710a08
SHA512eccb28687cd0a6ab4ba4c63830d70c6d51b20657a007db1a6cc00106f3042de7c9bd3eace86a02adc7afa0eace4cd27aa0d6f79d5108357e0e8cf6706b7c50f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5b16f608814f21bb63503b4689a7cd3
SHA1685c5465d774a008caf990a22631d3cddcad5486
SHA256d5c1312d57c0e53432f3507a91aa55ae7f5b4323a7cd397f061f3cc3bf7346b0
SHA51285b1e63576de78d72cd13d5f7120265439a3a6bbaf3fdc6b4bbabc0084ede97fa2d06de395d605f23a1fb54f08c633cb95debf6a91640c7115530232ff32835c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f3835994f3cbfce9817008adb1f6ffa
SHA18dc45b8128c620cc27265b624b3273381b2add6c
SHA2561ab359d1e36e72557feea8e2a94a929f801d2c6f8efdbb8e6d2eadab26da7296
SHA5125ef08896bcf70a0580cd7b3611009c84ea9a3cddbc05b53b92deb794bc5808500e0fc985c0678758ab8ee337ed64071d7a4a38e838121115d88ca6ab9477a655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe5717b03b5cda1f1717ec36827d4772
SHA1e00121fa623f07d02b4f50cc16bd85bd325e7f31
SHA25693a176b17ffb1aba872621be50ead401622cdcf19506a03cb9318f19f116707b
SHA5126664a389d53396f151d3058d5e6373ba932c0c29bd285c07e74c4b1fff26c6ea8c54c8c04a88d7af23de8d613325d9246d8a1796afabaaf80e381bb1ceeca4c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54101f3d93fe98bf60d77d613bb1ca652
SHA1123cb8e399a3965646980b82ef11ecbf0e530ff2
SHA256136777d1a42ce9efc42144b198fce9598f0b0e9c521221db6c38c63ddb81a268
SHA51243a404b741e22f1c99de33702c4e9bec7b8eb4f9a1a3cc15ede835df15c5151218e83c86aba2635a574248ff6f5b9b4cd6dea3985cadd38dc81fec98579d344d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a