Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
3c7a80b0cbe075c95a7e94c1b747ff1b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3c7a80b0cbe075c95a7e94c1b747ff1b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3c7a80b0cbe075c95a7e94c1b747ff1b_JaffaCakes118.html
-
Size
7KB
-
MD5
3c7a80b0cbe075c95a7e94c1b747ff1b
-
SHA1
cf7a4b2ede7eedfedce472c30f4644e255b0ff60
-
SHA256
f8038a9adf868839397de5f242fb98cacdf6c8c56c65fb2240cb5a332fe0d275
-
SHA512
e13e4bd95548d43d83eb190e5f5469e7a166df0cc4e465c885925e856706865aa02b56690434d02c584387f87dc7b255b239b6c8bce6b0da62928943e2dad3dc
-
SSDEEP
192:eh2ULqjtiLn0/eq0YYqS7zZoEepAiisLNTcLo6z:42ULqjtk0/ezYYqS7zZoEEAiisLNTcLz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421719261" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10953e57c6a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000189c55c91e4a3d7e8d2cfaff43f056cb633d0a9a826c1278d490f067547c9937000000000e80000000020000200000000ddb6ec41f9f1eb565033a517a537f1fd1127ef6de51e3bf85ce1d257ca65875200000000e9ac6431e8c8e78a1dea772e73f9385425ca96550e913f8bf17e7a241695bff400000001d1f54e45403cc3585e2565e292532faa8b1785acbf4e9a6718ba01dd8420225ef9969dcaea64b726980a869410113862b0469cba0ecd077eb633ff3b9fcac16 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{66547561-10B9-11EF-A538-5630532AF2EE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2164 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2164 iexplore.exe 2164 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 3060 2164 iexplore.exe 28 PID 2164 wrote to memory of 3060 2164 iexplore.exe 28 PID 2164 wrote to memory of 3060 2164 iexplore.exe 28 PID 2164 wrote to memory of 3060 2164 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c7a80b0cbe075c95a7e94c1b747ff1b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5101520f5a3ebd928d2eed38caf7ac6d9
SHA17ebc7d632c856f1e7a8316dfdaae2ce3cc1caca6
SHA2563794b649aa475bdba5bc5246694848c96335db5c622631de3897fbaece40e809
SHA512aea88459418c5810335cd064b79b3d4ff3327280141438725799c94a6c720c17d6145263060f9fdd995b4b8741797f6314b2aadd284930a8554048cb81a47e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50156463dfeff509707b378445d88212f
SHA1e18882c4d4f65a1f68061a20acec74b4615ace4a
SHA256724d9295ee381e95c902c1ec941ceec7d8e72a4d7c2dd299de140dab06f5194f
SHA5125fb871122132cc7e503c28e709afee1c0211480f7fcda482df109dcda4985afc8bdfafecc5dfaa85f62d3e40ead9a8ef64692c1216c722ad965b5990ebf7084f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e86f9e1bc22b80d9cfe94160358e71c
SHA1c11604e42d0b6ca562e0ea2c0f954357ce12aaff
SHA256bc10667cd9938681054d07a3393abb007fb73e29daa2b3949bf307bd52a7a5de
SHA5121592fbc69626a98d6a600c1fd312890da6278d9ade02ee075ccf163f96e43a824d40b801324d30f8e8942c92f94ec68111707445349d37ef87c8bb56d80171de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9811dc599cc487d1b49cd09ae399306
SHA156e59d547ac3c84ff29e79ba1a2ea2aedb177c50
SHA256b940dad1961119ca8cc41f36f1604bda1d462dbcc382c0b9ff8e2b5e5c58e88a
SHA5125138cbea2090c540e91d47b387caaac1d1e02f36aff60485fc3077c4ac8df557de80958bff6f33c04c20d34be4f761122ca6be35f53d3038953391343d793d54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cff249babf3a2353c74a2927e3ea954
SHA18d63d267aa45056ad8d2aafa127c52e29361984a
SHA2566f23b6f2bd19f2b78eb11d7bd8282bc72b671c464c22bd5296dc73f125b01839
SHA512fc0881dcae13f62207d137b33ffa2cec4c93cfcd9750f21bd860d9a8694fab5c9ad92872a5bbf7377b046c9ca6e9327a1cf8f54231ea1a4e0ea28fe3fc0c53db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6c481d4a4a719a25c8eff69695cf60e
SHA15371f349f7d9532028246ab58ed1b0331722f8a0
SHA256f88cb0224fdfae50d88c751561c00a89c082c0add536579ab6a6c91119d7ebc1
SHA512b5b228a5b591fa844cafadfe91f2be86912c5aa78b606b8cbd0216a3ff8a380b59057996a77c5d23dfb2eee20953d5dbdd68e19f67348fef8cab96f51af6e005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f28e42fca6a4375c89f0ec9a595edd80
SHA13e8ffa81b30e62c815b23d5e0b0968414d5cbd7f
SHA256be6baf957aedea5ee49544e3618f3e8beb8e63f345203948cc8822db440199d3
SHA5120a0411a0817ac88df4ead5c09982019cc89217944a609de5df68f7a2f3cdb8859d5c0aaac23ae59463118b86273950f206f82d010f2860778ad78fc3f7f2ba2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdba3e85f9923dc58cbceff90111bbfa
SHA1ba063258eef9bd03a2d5f6d181350937731a2d3f
SHA2567cbae65b874d017a51f3af9630a4d689c7e687ced8a8d723475832d6db7e6071
SHA512c9cc82372b6a5457fc9f4527abc98b909b308e370c94065ef27a55ef98939cb0aa5edb8abcd377772bf794481e0256906baa755ffec23f7b27876764e8cc1ab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ef115309c887b51b005bd1387223141
SHA19cb6dffc0e8633760a6cbc88554b1daf9561c626
SHA2568ba4ac95948fab7db3b6dd008db7f9d1bafe3085c7b29bb3d2f6ab19e42f76bd
SHA5129ee3e2c5461fbd94366e6c23f44dee1fddb360028b21c6b79a7548713079c794164e2fadf1bc62ba61138e4145335cdb2f8fa1e7fb8a222c42478dfeeb1f5f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556c1331972817a311c424546a54ec336
SHA121b3d0cabb1453422c37aeee8c7f3a2ff476f6d0
SHA2568f93463f952a7bf4a322b5307971032b6a779c507df95efee377b4536413d18f
SHA512e9dc37428d6dddbb9c066fa483dd1d63ff79575d1ef83e9b0e0306a39142d29e44ea2d6307d2945de49cec6246fd95dfbe580b111d4b3afff894d8c334ffb05e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54476ec81991163a25fe62b54ee6f115c
SHA1a9c6dc5c93bcdb1cdadaa8b625abfebb3775cdd3
SHA256d73bafbc11e760626e605e8dc5ae1334d31d7a585fd8387c8160e6e8f0131261
SHA5127f3313cf408dbb89198d077c76fa6bc64b1e578c2af4ec53405bd9456e088a38a0bf9f5c0515391583a11bc531a8db3a8c3a9c95182de9bd664f7394f4765d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538554dc5203b4c8e434b0c7486fa4219
SHA1f6cb0c4ba5e1d878b024f2f02ac8139e0290a4e9
SHA256d2a4e15664f0c1e86616e30f33f5d3fa03d49d034f55bc8d32eb93a0bda368ad
SHA512aa0832286a55c6dfe276d5ba482486901b1b4526ca2e3c544b637f47ee65e6a9a2e5980032e3a3e4058931dd3424ab0c265bb1178c01f19fc3b2bad28f24ae40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3db99b3ea7913053bbf626bdb25456a
SHA1ac9e84bf495a46c0c477d88df7f32cad56c4a715
SHA256f17b1bdbbfd363899769a72e9c47d1785699d34d006e6e698444e895e4156132
SHA5121f6fb9b35805c4e5f3dc09f54f88dc82638674107f6e57f1f7635ee18e771f0d65d7c3b46083d5fee6ae8dcaed55a3bc30a29c0326a9c65253f30c14707585d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531e4dd600913951812db5c20aba7f52f
SHA148abc2874f2e4d157c69a23f68a6101eaef633c0
SHA256b2d59f5ac3b0bb0b65344d9b2e3fc47d5d8eafe4e9597ea3730044f2387d9201
SHA512f5f6600c92e8d43291e4018ae48a5f5ce6f8ba8ee84a0a3aa79aa3e7eea9e7327314e9dc50e51fe44fbd5066f054eb30d59550670b1fd97575c4a8e9704df382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4805cd701157e67533e6cf9c183ba6e
SHA14cd3cb952ce00a3dcb701bc1f705151af3f8c086
SHA256167e6ad67611bf99ee768355ffaff4092376caf453fb482deb04521073d751a9
SHA512cf3d035731d7e3f11b2f0ddb3e80edcc54e0ad3e0657090f964bbd7af7e09993d03d38513edf3c5f5027d0b5f69e4af134b6cb018ae26e7d79908663a6bc798b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd0a5e17e844588bdd01f7bc5236bc2b
SHA12a8f0c2e5514d05061ad3eb7b944fc38eec881d5
SHA256b2dac59520043b70191824d0ef148a64cdee241a37457a76ce172d0ab71119b2
SHA512cd29d579cb717dc8946f88847a523f0d9e2edbc91d08085ad58215c7a6e47054c2d46c9a95592e3f88326aa1a7c71cb512d41e48bc8a5941bd5e470d1bf484da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee40f72496464f1b8ebfbd56b9b1022a
SHA1b02bb930ebbd1646b858e0155f47a19369717bb2
SHA25644dfd1e119b7970bbc320cc0e828e3c557a50ba3e6d043e59af0f89e7e7272de
SHA5121625443e0390526944db8394acf0947adbc38569e125e88abeedb88ee5ce9fabbcb31c2053b42effe3f142eb65c998ce6e2df89c8dadd0ebfd2f9c5dc5f2e8ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a492073da71d66aa84b701be08b70aa
SHA1836992ed5eaa5aa9bb00d5860f8bac3b284d72ce
SHA25691e60af43f90ee6d8f4e8dee33f1ba1a1f10075664cd8f9cd7029c2b175458a2
SHA512722093be873d12baf7475eabac4571c5a3923014a9f446c040bb07e50a69f580e954bccacc72cd5a13e94a3cc505fa9e46114fa45dff3b1e3c61dc6994df9cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c7d5a29bfb2b0f6349417732535c5f2
SHA1742694fa20aa52435c6a034895e07361b15b8499
SHA256317a033e2de5c7ad4a88ac34d3e487e6ea38cba8b9e8c553028d275b806b6a0f
SHA512fedceed47184f0835b9cf699e0e7698d01d2f060c3fb4c99485adca55bc6c865583dead58b26132f5c022c36800a28090af5ca6fb9cfc9c1f9afc24bc3f584b1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a