Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
33bb2fabaeb8a456610b07eba0d12e3a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
33bb2fabaeb8a456610b07eba0d12e3a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
33bb2fabaeb8a456610b07eba0d12e3a_JaffaCakes118.html
-
Size
44KB
-
MD5
33bb2fabaeb8a456610b07eba0d12e3a
-
SHA1
9b49662ef74b4ffa55df31a2e6faa1f89ae07b51
-
SHA256
10553cda93ab39128ded5a664e26642b868ac77644faf4a23ed78de211779058
-
SHA512
a2c45039d899224e3c1c03acc686d8047d0246e1a185d41d1c79146002319bb3ddce7347add5a91d4a4bea95516b6de564e720ce726d93d7dc6ea56a67a4e094
-
SSDEEP
768:oyGgRGG4j8Jbd4UzGKo51C+8DMONgC2zNFy/ZhTmngwCiCcCZC+CdCaCcCX/aDvy:oyGgRGG4jrUzGKo51C+8DMONgC2zNFyV
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421579158" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000494d74570fd4355cdced9a433e2ca6e86be16baa5cb82533f65d06a01e532ecc000000000e80000000020000200000002c6a2fb3342b309eae5c5bf6c0448f327242361131cc894496bde595bb8b414220000000d33ba0d9a0114f49b0263cb3525750882b8af863ec147c6d25ed9c7baf07e8be40000000c5d65c22004fbb222674fb1b4d29353e99b75011581396f541df7db105856441f2b5deee42432dbb1e95395912035d7f8e946d4412248b031108a99cfe4ecd06 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2083d50980a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31D58051-0F73-11EF-91A4-56D57A935C49} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2944 iexplore.exe 2944 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2940 2944 iexplore.exe 28 PID 2944 wrote to memory of 2940 2944 iexplore.exe 28 PID 2944 wrote to memory of 2940 2944 iexplore.exe 28 PID 2944 wrote to memory of 2940 2944 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\33bb2fabaeb8a456610b07eba0d12e3a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6aa4e2619db42bf5e154e59960c9a85
SHA1dad2c71c0a6116c093b615d612adeff8a6ca047c
SHA256376b27f5612b0343592d693a6adba6ca06ac4f2f4d8e8c0a4d325ae714afa38c
SHA512922864f106bef885d2fe9010885e1324f4784867ce006a5c9eae68787beebeda9e9106ad1f026608a7f9b5cce47877d0ca976c847024424e5ee5ffe137d0a042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59abd9d2312b36a997fd0c5a89f5d13bf
SHA19fc2322f09ab96abf0c695cbbe810952ff8ed4d8
SHA256249b27b1a9f91e7819391e70a45862e9dce83bf6821aa8c4d4a4e203793e81a2
SHA512adcca4cee9260ace3855c42dd3a616416529f2db7486f417247ba8f5c365d29b4891829a81e66d50e4c27744015763b8a3898267f70a7dbcc9d602881de94458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e796ac21d949a0decaaf475d352c03c
SHA1aca0b21c56f821589bdfdf6185ff27ab1892479d
SHA256f4ba0b9a741e17614f91bcee856c4c130b2da6d255fddc55f2d5234833ceb16c
SHA512ce7b231b675da10e1c1c0f5a805385fb65cbec47abbe2b7432329798883daa14b5fed08fa19e14662bb07308dcaabe8f61d3c371bb8322607fa44a9d61803b60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e21e7b22f66dabef157365cef1dbc1d
SHA178811ddae9a25c9e29e270aeaf1380c166ba8783
SHA256d4605bc31bf495ab1163196a0821ea03aa54842f55909be7098e0a94905b381b
SHA51277001a85115d48893e45be0c9a19c6de48c4f09ce25934cbc1701cca16a5fcde0ef1b539b4d4d49c6e1d407f34b0bf3b3d700eaf63820eab1fc82e173c5a4244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539d14ab1e0b7459b104cb6688e9bd59c
SHA138218c49f721c5e3143315de0b2fe69f4d5e80b1
SHA256ae4187633f04d78fe1184dfd91f0906f73becf3e2cd8a46738f46616225aa3bc
SHA51206c729f5e93160fd15f7587641a9c7c03539d9cdea869e74a3795b75ae1454bb380c6ffaa049bf376b2ca21ecffbef3f14ad602151a3b58852f43e73189ae295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5626b3be69e7aac5e98945f3ca6ff5387
SHA19b3930ad506ed341d553d569475651dfadfc9262
SHA2569d762f178690474e6aa905fc5b73e66115b1187a00c8550821cc9bb5cb00ea19
SHA5126902ef70570ebef86af83dd56dfb8eb3e351fe562c3c473c337f961cb27ad1ef0331748b04634b4c0f9a06f49815cf4287130ab64ebc159f34dbb7826b411317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9a6efb7c2f836ec58d252014149ef60
SHA1c5c81c9a73e1dc0128b3752c0ea6371906b90496
SHA256792ab4eb06ac9a45353bbb898e682f284341b82aa209557ec8fca232d256a1cd
SHA51226655d73feeb9c98ea921709bb9a53cc23549c72ede75a5ea8700c0ee0d3f0265c88eefa935e9b94e5ed83c39d6526d80e6d718d08963cfd2f0a2245cc9c91fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4eab9d5904e998f959d2999928b9f5b
SHA17cd7acbd50213d40290e59cae768c1780dd69dbc
SHA256d002017e9e4e7d2ae71a30f9f4565d6d7dc75ba9d0bcee7331db70e907d5f3b5
SHA512601522fcd20fbfdf1048eade481fd8402d6cdd447bb5b42e6a1374593b34a6b40338980ea007bd32e778007728ef919d470e5fc86fdf7191cfce012edb0631e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523eeed838ebaecb07443ad7729243a1b
SHA14668847601192b5d2ef5ee5167d2c5b27b3a8966
SHA25608d1a4969c2627c48a88b9448ebbfdadb0cd7e713ccaa181c4b66e60d825818e
SHA512506fea83f9548ef1d5733004dcf88e5aae06d601d7a9be8741ac01e2c494d69de7e9c127dcd5b97ae29dd5f5ce018750b5268485ab509426be4d1e675db7cc0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51397872c8f8da659f22c984ab33fdfbd
SHA1f2e7c26d6bd34731be101bbe77636ce267ee88ae
SHA256a7b731bb041522f62c8abd3a46ffc288a924bc13cc44977196a587b49a3c3716
SHA512169291e6b5c5b38e6546288af5c57b0b86df707122021e8c103428e5ed34aa257a953df5f3502a2f797a3012f99d05305419b93aeaf2e0982b3d8c27387f1631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae686b5848a4a009828f069d4436cc9c
SHA17b6aee96f0e0a706de90fd130a24e82df4533953
SHA256f130cc07569ddba92431b78105a3510f53f485c56e847ef868804b7814d6a190
SHA512a93a0f044e40d6684035e1dad0e0894d58123edd554b3757026eeeb02a9aee2c2ee74c740b645cb2a5e70a532feb11258739a5465d18a4ac2ea940443df9575a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4eb561ebb5c4e44ebe7a1d386cc1182
SHA18b3a347b05358f12b5352a202f46dde2bea74d47
SHA2568b79330be2658ab2523eae83cf2fc4c36df6aaf2e11d4599afb54cb86bf1a2a6
SHA5128a174621535ef7926b6f852833f743619658698234e3ed59d0a711255dd1a1a77dbb858bbbb8c327b630a95444180e9b3616f21d975500319ca18d03a326cc06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a4d00b7342549ed6f9ca82727ae28f5
SHA1312e5ab7401ec62dd3478d4861d43e8b97d956c5
SHA2565152173b4490e7aa98d2864b76ce6dc34968b6536492b94294132aabd3d866ee
SHA512178760df227d3a79e0a7ace8a79c8163ec4550228b9a26eeb96ff08459966166930c2084e482d2edcc03ec631e055ced322b04a608f28bb3e9ea2fa7a894bd69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58530787567d6614b90afc0a96916b82e
SHA1c165e1e4e25399dddbad0f1e7c8e7f440b790de3
SHA256d8f72cdcba95a9014417eda936e8a3a1038d4ee8e1c37ab3623a79af5e0bdddd
SHA512c242f2bec358d8c0b2745e60335a996fbdda0e06755e2171ebb64d34dafb79d072cf3662535f242cbba8462bcd2220c5f3ac2b2e6ea9678d8a3dc62177decb10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8f8486f2c18b2728dfa62fc7207b366
SHA1556244d0071a811dc0654babea41a94ec2e6a07f
SHA2560be822ed9f3c608a6393bbcdbce47e2a94ff1c8ada729b4401e7bf36dbc22cfc
SHA51267993ac6558dcb619ebe9dc8badf186108e283cbe744de17121ac9921ef198d19e4b69d9ee3778d91c8584679874b7663e9820aa3bd116cabf4220b9d0520dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0f0bdb9e45f4c4275e13a6f16a218a9
SHA1f7c5c39df273caeea4487b0fb3187cb8ed2c6324
SHA256e12a855e8f69a231486a63a15ced698fcecca651bbad3384a45bb16ec25affa8
SHA51255c4bf4204a4ec9ae6d0e5f3cde38bfa9efe83da78f6cf9791fb270dc32287bb892ceddc9abe10ee31ce3c83a9ea4b40e8d73d1f87d2560cc9639c576af35ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5252ca77f539eaf15c6b9e44cfc7b6f58
SHA1f5b0a9cf3ab3c265b2ac15d98a0dbcb458a8e308
SHA256dfa0cd68176e96b23992a7c749ae5697b910c643ad380b7c0a5bf4536a04e197
SHA5124b1b9f4f4c33c970171e7074c57ef7ec9a45997ea8172f442bdcdc277b5b2ffa99c391bbbad3ec5824125a2d9c1702913c6c82bc369f0feabd9fef1004a9bfd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562d72164c8d21dc8e8f4b1bb3d974ddb
SHA1b4673616f16e93d4b7774e7141c3aead9beeb85a
SHA2568e648e4f119f32da8a31a728daa0b2cabe91bde15d046ae783fb0ebb8330b8af
SHA512a998a8f66bbeb0ba0a452758f5714bb8daf54a466d2ef5945e6c7920c9b7081f6a22682467256940881be305fc6455fac9b42e371d54e790fb570f15de620248
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a