Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 06:41
Static task
static1
Behavioral task
behavioral1
Sample
3341771a8fb3cc45dc5952622e0ce57b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3341771a8fb3cc45dc5952622e0ce57b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3341771a8fb3cc45dc5952622e0ce57b_JaffaCakes118.html
-
Size
3KB
-
MD5
3341771a8fb3cc45dc5952622e0ce57b
-
SHA1
a57a699e627715c6929c420036ee7307918cd821
-
SHA256
24aa00261ba9f9b0406c94052f785748d66105d07a821e1261dd11d2c18adec0
-
SHA512
162f72e74841ec14c0243b4badc84172bb37a8887240335ad15a45a6cf29346cdd332743358e3f20a5a912b79d2b1fc383292e58a1e3008dd1b8555053d2f4d8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30666a666ea3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000b9cf069c0602ccf0e3f55af0324ef9be0166872c96d7f9fe41703f7c011af447000000000e8000000002000020000000ffe636da6fa3d3dd6e5c98ef157b8a0c7b377242c6cc45508e89e39d5f5a3f4e200000008639850d34548fd2bb63495c2ec45331e0a936daa9c41f04806dc681495d7676400000005ff5714818d4a000e41d0ea8aea33b454f8c440dd496bd1c140a825a01a3ef7d1cbd3650ee11219315ecf2c9349621e30f43a5174754cfe8becc65e6123804fe iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{91BF2BE1-0F61-11EF-8DB2-F2F7F00EEB0D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421571588" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 292 IEXPLORE.EXE 292 IEXPLORE.EXE 292 IEXPLORE.EXE 292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 292 2424 iexplore.exe 28 PID 2424 wrote to memory of 292 2424 iexplore.exe 28 PID 2424 wrote to memory of 292 2424 iexplore.exe 28 PID 2424 wrote to memory of 292 2424 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3341771a8fb3cc45dc5952622e0ce57b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5d8194416963324d06e242d721f8724
SHA109e619a25f4b884fb1ef3f29cbe01332c8112f7c
SHA25694ceb992327bb93165ff9f78d9a4f60f732e379a9f5d3611363b72fca2ec9ebd
SHA5128c6c4e6cf414356d1efde0d2593a82162e0cfce7fe5fcf0c540c190bd496b4a883b77d0e292db37a8bc166523afdca88e747c905db457340ad9c07e890a58dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef42962244d876f71e02b7e695f8ec07
SHA199be302d15e669abedc222822ef70cddf6f6416a
SHA256e4f50b0a4da8ced454df0aaaa73f524eb8b6d916593287d9d6a2ce52551b6fb5
SHA512bc558514dfc10cd286ddc9fcec20d68f0dbbf157e24e72baac2f2f64a074af2cd4a1339fa65fe8c37a9f73064744ff356534cd458e518a57550520714eac6039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544e22aded94b17ba7774061e4c72a900
SHA14b83de9d73f4ddc490d18583e67caca2611d2a13
SHA2560fb47799304c5a861342184ecc9154e0ae7f81886815c4ab09b65c5927634680
SHA512f2e504b8f4898cbb9a7fa5d9f08ef85ea3ca5312a9bfc0ba55a98fe9e879e21fe46d517ae72b893d32979f1353409717f154a62b656571e14a2169fc7873b302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5639af69fbd768d1871e6a5859e40dc19
SHA1a22d461e263915fa380219eda70c6ea78464e150
SHA25620cb94cd6054079ec751e77a159769f84357ac5473b8c9b1c44456db45f9649c
SHA51263920926c7ca5888bce3f50152c4d406e8d0c98ffa7db4e66bf746b909fd6ecc33a28587e11a8f05364a32b541f1f815ee7dbddfba294c602d6a3fe36641fb13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cc7e9516b17aa7b87b9baf9c8cf8c38
SHA16f550f5c698f406d61b5c26da19d486e6ea5cb80
SHA256e98c62427a5f38436775ed50ce6c4480216dc45bdf9ffbb8dc6b4c1dfe4951da
SHA51240df122bd3309a876d0048f80f5c6160b8f47d196f8392ad59a5299fcc5ce43ba9a166b7dd83eb0b67b8df5e5fc272410287d65e6de05254abd71f6fe1802514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545eadc7c87b9264c74246646f12627e5
SHA1ef7544475d92c676a523f0f87478b077b8522456
SHA256645fdc5aef52777c1b080f31aea66f7dd7299d7490a6703f523e86e741e1c630
SHA51204a2ce0ae9ed2eef18b7766175fec3d5f5a32e11f84e426b10bf210d2dc58635b946f1111454598f458ae2e83eae63be0b9d443973cb019cdd435a77ae9ba347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fa51003183e40bf83f27fbdb6538784
SHA1c40314a2eac8a33b2be722e5c910604c0f6710e5
SHA256dcb6934e39a0a639f0e433858fa4d8d458ef32b9739eedd2adb3f3b12cc17196
SHA512c3becd2db53926c6a22be921c345f41260870a62ee8e527752d33901c73105019c4849def130e541612c33f76a79056250386731f825a0bc3e780fc8dbb2030e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5352dd9ef793d84c0091d1aa44040e766
SHA1a032459982deb1d5eefd7e9f46ac86ae9c7b3dd7
SHA2568db534bf1c3b9d3d819dac8610fa8b089e0344ff925150f393c58b6dc305d722
SHA512d79fd8197cea60d4d75df69f40f5644109735aed00d512c01c9b5992191a9f0c135b02d04cd79595bf1b4c52bb58a4e1f327911697350c30d3097b05a9373107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f57f7443dbd835408ad6a65b58b22476
SHA19e2cc5e898f2e69424f6c5dcfd0f0313cff4f28c
SHA2569790d006a40096510e8376009a1d3810af48528dfc6fbe816477800a6478fda4
SHA5122deb32e2b66e7034c5b6b2806cfa8297e88ef76ec905274832c4a433316250fd7c7003da9ca8266fccef331640fad769b07147a078cc05909ab053b9e819fc3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dad775e7f48effb39dce303d56c27599
SHA11202b662e94c29e63328cb9d61be7abbe0c7b565
SHA256626d3c7d0c73f2b83001d554525d96f69819f7f762693e290a586df7ca0b803f
SHA5122c6701eb5968ce52f0c0cb16b29c34de6eb3d745820eaf958aa03e7dc885ba5fa458058d0b905208801ccf98f45aa6770daef34be53c123a19b4b87408a8f3ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc8ca2eae54fd13f7c8bbcaf9a3e3fde
SHA1fe3ae3f8ff1da9c478d3ed8db6b2196b60b6a059
SHA256b02283a64da5e9d582cad6d868db64d399a11bfe8fae8b0dfd8f3c7a7944b7a8
SHA5120fc0d1af4bc0a474cbfdcfeacf030f6e8b0f6d99053a94e8156ba3c65bd6c09a05a9a4df07e94baa9d82a4f888c74c990d3ba44591c22ee6fefe1fa38c6e2ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58258b370f54efe3a0c0535004e125ed1
SHA1a47137710c14cecbf0dd8c7739246175c0d056d1
SHA256737304274a35826029f1683f0c25d81dd22e4d295918a7fa0e1016c3346d5655
SHA512f2172b0a3819b35df1504cf78ea342f7de106197eedb41caba9da25096c7a4abb0d0918ae979a34f0b34ebfe23012b16ebb2172c725f85c7ed7c63c07350526d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a2a5428742e98dac3b3f1c5c81f10a0
SHA1a95938b02a08d60d99c1030aad9d6e1016a6b732
SHA25627b977824a405630940899773f0b1795b12a63d97234a13f35f81ca486d5804e
SHA512916b8aca4581b029f6018e90aa403f85b55ae508ece33215bebc754fdae30c27d1b0f7460e6aab927bf841711316c54fd4f7c4596eae82a5abfe8811630b06fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bd4ef01054e3bb39dec6ce5317d34da
SHA1b672dd34d29cc90b39965635dbb15adc6d483f81
SHA25643eb6b136bc92ce4d10eefc42b7c5633975bd26393e900ad7850586874e78a6a
SHA512ab3ae26462c5d7ae21e79def0125a4c57d0957babe707140d5ddbbc728c75fc4a3ab05de8b78f14f1f0976c5883b11ba71e3e09ebf18a4c12d7fd5c0d142bac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5748a97f4219d950693dc4c4f744a72e2
SHA1104906f03de23febcd98f9ed7beff43b77ff5e4c
SHA2566d52c2f8e7456c26814b26e2ff1f5e541723ac8a17e54475fd199585d6d843a0
SHA5127b355a5b09212dfdf3770bcbe17020037177b45329738f7f91a00a826e9cbb507b7819876f5a84fad9ac18d7ec25e48390806ba37a86c629b2b5df4ba4014220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd9c0ec9b388de9669803701e86bb11a
SHA1279950474d8a2644ae5c4b98f1ed3c9cee077c8c
SHA256eb79e249218454855b4c19ea8d35b191f2e18d2c9f9af6fa8962e502f558d9e1
SHA512ee958862c8ca768067cee6b94ea3443fc9189afdc3baeed5cef6f3f9623470a72a3b39f17adfa4adc2eaf5bd4040e0f193de9104cdc2be80b0c29e60fb77b087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5205625767122a76c065c3436eb42c4b7
SHA16b23c6160d3814b0906d85a3d5f2b2df3d93c5a9
SHA25638c8c83d6427c1f1457f1bf559d7aff70d5fdbdfad08bd847d51a3898ba06f05
SHA51279f375b3e70499b14d65467b8667bbb65a822d5f5c4c66ace4b4c327607d958ec3df240319e747bea835356bc3c93d0ea75a5a6d3c1074ba18985d3b5cd5e174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efa8c6d02b778dc0d761f14b6b205a39
SHA1737d80ba3ef749a678580e1c12eea851c4040784
SHA256ce68008f750bc7e83724a16c3547f40ccc0b6c48c6228185a6b7550213fdaebb
SHA512219e426ee299b4883126499eb450e003170ed534ece19b0734464ba35ab59680576e3d161d58d9eefaea0d18de0d2254de804bbcba45a94eafcd4c6e46b54260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f22edf5ac0b6c821d18b3a981d8509fa
SHA1b46181b9d865eb9ce957cee2866ff5c1c37b235a
SHA256695765ca26de716580bb85a24567ff768ab9cc79c8e23f646eb6b24a54454d5a
SHA512d28a90e975d1840289894146b28749f41495e27b4e1bc5385f0a33561e8da2402d78ca6159b832121438a3e1fd7d83f9e22f0bd2c4c0e7838cf04ee63e38f77a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c660d45b0b260a50e8f479fc21eacbe
SHA1d62d92334064c31138e823c65f6adcd694d04d42
SHA256912027a7b93ee69cbb6a93e4173a3df5189ecdc12f8758abb951d81aff43d301
SHA51274329e217b836ee2f512e7da0095395a0a933a1b45fd5c05ffd41f6a48da0624980c1d68eae4db49671fed32792aebd2116aa6ec76f3a7a0b70c8e90ef8d49e3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a