Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 19:06
Static task
static1
Behavioral task
behavioral1
Sample
36182dd10197520a60ef57637a29442b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
36182dd10197520a60ef57637a29442b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
36182dd10197520a60ef57637a29442b_JaffaCakes118.html
-
Size
36KB
-
MD5
36182dd10197520a60ef57637a29442b
-
SHA1
32e2b203c93293be2eb31a180d0910528c2c4363
-
SHA256
e86089a120d0da3cadc6b67ec4d5dd892289dc08bb60aaf4055a88d968cf048d
-
SHA512
4005558e186104fbe015adc48c934f9f86b981bff561162c1eb34f4af81f087374b082f700995e0475b21fa34102fc33cd5ef34e5f689ea9ddfded088a28d10d
-
SSDEEP
768:zAfoJ0ZKEZAMdVUwFHGa92Fka92FuvQ/RwG29:zAfoJ0ZKEZAMdVUWHB9+9XQ/RXU
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000006c1525715680f58334d779aa7e9f58f34d0ae44198b66769aebdc8aff3072aa000000000e8000000002000020000000ccfba2ea212cbf1a441bbfdfc5e007bb9be485125bd0b0b1ce398fd7134948c3200000002f5c37b9181305a80af0cd4421875ee3643fe71a880d4a9a141635dcd3025a8c40000000f1a02d4b5dfafd50d85f7986ba5c153de66d696d27b41c7c16120a3cc4afbb3b3b07b965ecc0ced040c720ad51cbcae8845a657665f0b49d2ff7769f0a26e928 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04b1996d6a3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{928CE0E1-0FC9-11EF-A57D-4637C9E50E53} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421616256" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1196 iexplore.exe 1196 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2772 1196 iexplore.exe 28 PID 1196 wrote to memory of 2772 1196 iexplore.exe 28 PID 1196 wrote to memory of 2772 1196 iexplore.exe 28 PID 1196 wrote to memory of 2772 1196 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36182dd10197520a60ef57637a29442b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dda95c71337c8c9f77ade4bba8e354d4
SHA12e1a31590afe6720cc558d97816752946e1de8cf
SHA2560270ca4405de552af61a95795110dcd748a16b657508137812a0d1b18909ce6a
SHA5120638ffb8bddd91755e793cbe87e4ec35f5962ad49b94927fff07c01a5e5f884992a75fecbbeb95eae3eebe1489647898fa979eaa833b433a392d80a98f79d994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c543def9547e9318f0033316f32b079f
SHA1332062ee01c109c2b30e542020379a3e3dbe965f
SHA256c5afa93baaa48cebf642a7e44bbe103caef05e4d1af2c55eeb5f65894c920b56
SHA51294622c0b956ebcaeb0ce8ee7dc6391ba16b30952c1af51d74046cab475ba920c8716a6547e251efb8eff93d5332f8f8466f7a0bbdc6dc26c53d5c0c008112b5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571fc208fb97fb35baa7f9f661ea4fe4c
SHA1476b1a5f94a596da1fb72a67c3ec47356a34255e
SHA256db75eb1065264dcfe96b34d6988cd44ab68ec31aa51710b783b735dfb3ef3bd6
SHA512c00a3d18a91a180a2b0239839b904fbffcc577bf251616e02deb295656d775717d36074480ada4ae290efdd550c91376e1b1518d80360da7b6a804a0a3306d7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521fb1462ec65359f2b1ad4b8dcb91854
SHA1ebdc000ef2dca262268dd31ee80db9ad74f8815f
SHA256badea7f9ea8748995950bccb433cf41e7b67a080c9fad91a363b311d436e0930
SHA512142d2f304a5fa4cc81e45a63d591360ad6c682e0c3c76cca06ed368fd707879009e019f438e51f56e49e6d20923fcbf7caac37df05be21469afb0dd226f530c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519e3562ead935e560ff46792b35bf3a0
SHA1246896d708472dd54c69c08ccf45f8e1efec9ac3
SHA2560b653a07a2f6ed7acc9c1da50dc73353e7a9ccdd1bbdbb31852e479f11dd292f
SHA512417251ae47e5e0f4259adb9b34b8f3b8265c6af7efede1068d7d3f973f5e964bf287f6597e543b84c3eff898cd8006a52e472341477b0774b2d26bc3d2b6b8b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5366897330a1843c114e9f0c7ec0b2aa2
SHA1d76be8ff65636fb3bc7bdf952ac619fcc73ecaf3
SHA2569bfd01d350a93b3aa5118cb73210a9da1c2d0d82ab861813608abe7d0eb556db
SHA5129928ef5d345c45a36a077f8697205f3b7814e2512d2303d4fea63570d7205f0abe1c3a446c48fd7065a6591e9aec11b162ceffe43aa9340452cc51669102db7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5780149e009a33508d2d175455e4a1076
SHA12bfb35f03e38b3f0871814da2429690a3a352a88
SHA2568b97379978921727a7988a3079c150a311f6d98687f34040bac235662ff06068
SHA51252ce9b3c9883472b8a8da77a788daa0f726683e63215760d7518c45efe98176d063b50e02a2c92a22fd5b9478986b0ab1d0037c538f8dad227e1ebe6f68ab7f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50337a47e1392cb219b730f80d0be0fec
SHA14fce1acd47ba6700b6728bb4a01425657c02c6ff
SHA256b929279b76484f986ad39b9ea8656db4a34090436cf4489847e9f5565e1f34d1
SHA51229fbbe47d0aa9c8d98a4445c75e79cc6b6e0a9e4114cd9d3d22fcee67b426d2e83fa8520fea60749e93904b42ba410f77a338815e94eecbf5dd9b1a443eff8a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8415963a7da838f8cc15d72de23b2ca
SHA1627ab44073302a6ccf612d0b0d6fda0f0b38b4c6
SHA256e6618121723e82742fc7157f017c7d3192a29c1c17da63c20b1def0f658ee0bb
SHA51200351630bb1d0515024f9086168d0d4d1e706f229f86ae6c9df0f7c438b86cf10fe15fec59ea8ff1cce1ef592098b27c328352db0ba0af6728d8c2af76cd8c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5381bc01bd293bbeb745ba2bf0baef20c
SHA10a87208fbb427f2217cb40f1bd950044372dbbbd
SHA256f2a9e181578a557a38b368f488d394cceb40c07f27b0527467a159d8acf0bef6
SHA512c96f1d3978f391c4369a312016ff2f541bad469b1b0b1c861efc73248c7a1e8315c7d7db09def80dc0d6cb48e171189908b3c1dc4005e4eb77f9ebf1441c992f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d357de0daa5286642982cdbf81e673e
SHA1856ad9501dfcc68925e8d8be3ef48c2a0948247c
SHA256d2dd9654eb8f3bd695d6db9b8fa2a3a14d9cbbe89621968d422b192bb985bb6c
SHA5120abbbde7125509ba1333685f89ee5ed026fed9ab193ab1b11dfced861f757e245b22c75cef6a74d9fee3dbb3be50ed80455d0e71e32ae425031363322582fa0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b6e6cae1f98230053bda1eff06b85a3
SHA17e253079b49391b09c90efe74525434b980654ab
SHA25683dbc1202fc066954ae4343b9d6feacd9bfcf0dae2bb769e6fcea6f40baef44c
SHA5123d7305b6c509294a7c8364187985981517c6a3c5a487b051b16113ad6642870a82711594fbbdbf27531f789f5e5a81b14360e114161e8f70d6f016da03f54396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515f9573ac3877cc4e15c8e3b2b9177e1
SHA1a846b478350148e35f0b0c13dbe923a413d92e5b
SHA2568e599b2d5e32cd64761a2496c8907d879e94633abd7f14ad3beea475c8287b26
SHA512be1c2f16d084328002f67a6956e4d8674f9f3efc48301cc176a10cc95fffc99bb6e78793f4b5710620e834f2fe89473fb3bdfae609abb3d4434a6339ed60c998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5130887452a43023fc8a12d1f8f7fab2f
SHA1111c2597a775045eaf0f50a05882968218d1bc02
SHA256ab3d5680049e21eadf18d52eeed5db8426ec7edc202938a1de69a422743702f5
SHA5122f7f54d8832c506089b15e4ebecd61d03605dcfa3abe93bb4662a9160fb62a37f141a8467dbcbf2bd6250d61d7dac54dc39ea524edbf623d9e3606818c0df530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9c8b7c11856d2a8964a82a4beab2cb4
SHA12f6cb50646337b4d863ffd57eea885a7449f3b4e
SHA25670bd41c603f23c56d19ee0cc9fd93ed17603e2491f7974f3d7bc445aec8cf876
SHA5123c40c720e80c8c445c752f29f07905b006fd61f410eba01f62142cd256cb52fa995ba3a584c2a74e4ee1364e1324885e9292dc60cf69c0ce8efdc0e5bd070f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5563f18b97d8fae5120e157f5e042e0b2
SHA1aa9f46ddce5d41e8be948f5c749331050178e234
SHA2568d467992dceb1b0306c0c2bd743700cbc5162632672cd534e22cd76bfbfed74e
SHA512870b1b19f8b83d1e7af0361ad4e548f70e54071bc682f27992f196e0cd8e453634e29a59c6f944fbf65fde156f46e547f826715bf141ecb056db992dbe399299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561218d303c3b55a9ce55be43e922ebb6
SHA1d3999db1a2801eaac6b73b6e7229982187a12bcb
SHA25640073d749c74e8378067aa22a935706a652d9e95ef0c1fe961aa983dabb2daee
SHA51205ca015db1763db0c4f1cb6060e5ebd4e7084b8bb09c66dc5d5562e7c0e3ed261edb553ac67e78665482213ebe048874ae23927e34f4ff03785793415485bc59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5407827be15944ae39a0f5dd4e9d5436e
SHA1373502bdcf479ce9b271a6810739345e7d5bbe1e
SHA256db3a5c1966bbf5147d2bebc93f92b28dd66e0e7155cc6e0efcaeab826d955909
SHA5122f990b4ddffe221a9bf0e2e99a8db4bb7ccfa7ed5796c0f7c5798638a9ab643f35e1ac4153e31ef3dbdb6b27cad5c7512c08ef086cf229bf3046c0d6d99e489a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdf541db92e8d6e7f83a060b9170f588
SHA15275430eb20ba34718a72f09f73b6e7368929e0f
SHA25682046387f7ae6ee8948f1b8c6c015b0e5231859a90c9731c82a0fc70dcb31eed
SHA512e67d1f85ca1e4162caafd78750314a4455c2706f8b3cc4e48a5e3c328ab913074bc37d15a839e1f69705569d7970b29eec509a4b137ad69068096baa611cc69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0da2a0aa3cf66f79035630f3a611d46
SHA1cef4d264c21f020c39823b42490cead8beb09742
SHA256eeb2721205525b7cdef1d41b141e7e2731af676dd590532e06b8df74bc733280
SHA5120dca699aa9359792d3193cfa48d46a1e306adafe2bb5f813305dd9b3438add7b823765ebbd9b4a6186b0f738d2222043c9bd6f439a8e1e2349f7b1b8f43e2ba2
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a