Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
37e250de9af3cd04220d785f27a0c4a1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
37e250de9af3cd04220d785f27a0c4a1_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
37e250de9af3cd04220d785f27a0c4a1_JaffaCakes118.html
-
Size
60KB
-
MD5
37e250de9af3cd04220d785f27a0c4a1
-
SHA1
85782b402788d76f7570359f8f2076ba412105b2
-
SHA256
a8faef88be1d132ca67c02fd8f38992f2348c5f7130030be659ff9d269417de0
-
SHA512
0389c45a52958c8173aa92b85ca1362ddc91cfe7a26f24891659b72745dad3c3d6b49352f65e6951c82ad78204412e3827f32cf9a84690514f96484d855d7b1e
-
SSDEEP
1536:v1CmrcACEjAOHip9MjQGJ+scaFlLl9vpF7xy4ZUGLz:v1CFEjA9p9MMIPcaFlLll7Ic7Lz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309be6ec17a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421644398" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17E22CF1-100B-11EF-8C89-6200E4292AD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000d242e9eb7ce48e8fe64d57c7655b160d4f50a909e2d88e9ed41168caaa223e9a000000000e80000000020000200000000b4e47d2f97ac9032b697b80d36117544261a86d6b1556052f8b06bed5705e7120000000f8ed668bedf319ea196a1bb9242b491aa8f39aa91b45e7fc432e8ccb5a5ce5d940000000dbd8c3abeac56c1a1ad6259511e3884cab450e9db8ecadbf7049af4eb99d79f07d420c448ae9010c719294a9b7018733f4d66246304cb4009d4c08063aefe5ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2836 2244 iexplore.exe 28 PID 2244 wrote to memory of 2836 2244 iexplore.exe 28 PID 2244 wrote to memory of 2836 2244 iexplore.exe 28 PID 2244 wrote to memory of 2836 2244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37e250de9af3cd04220d785f27a0c4a1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57af166c7f1577969f8c702177201b612
SHA10fc10e401234b1aa5bf12d3fbdc35adc507c9a60
SHA256caf6870ad458669ea73a383bc1217735bad871381870a279312be495d00b81fb
SHA512aa243d97e0e2ed1038046d5fcc6965788f95d3aa52631ffaf37f86c079cfe2cfe14d875665df1d30f3cfdba04c0c302ffc5a8e70aa164b393685e7a58ca93f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee3fca55001af0793c221f56cd2eb93e
SHA1b7a8bec02a87cf4b10e1371f787ba7171c26a378
SHA2569c9ee055c7ac00429f51ebf5f558776898c80bb75f4e2f823af39eccd43aafaf
SHA512b66fd0b15b796f81a18f347578e713dcc718525cb17792de70893ec6e897ac6cf7cffc2df7333cc6136aeaa19903cb0bdc274d457fc3e897ee5b74062cc4b0bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503c15975a93e958a0f5f62222765dc69
SHA1de87b8c7e3c0ef8be2a0f130ffb261a5925c06ff
SHA2562954f508507f511a9328f7ceaade00c58127ab2a8baa4f96d97c369deb189f6e
SHA51295a2870c56b78c9649c301bd3922f86b1d77238772d069d72a3fce224d504cdc72d617c0868c33648e548d9751c380705da63b20a740e50515736ecdf44f77ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4ec07b5e04600694f9cd726f7670eba
SHA14d3dab094f18b9c264fce1aac172737302b6ee16
SHA256621f18e0090350760a68d260b0c096ea965238c1c123f4b1002ad6cb11e8b6ff
SHA5121f552fe5342b3953f1f7dfebdda85c33854892beba7ce6feff47433422ee1e4bd4030931bf5122822880e6ae0aa54e1ab9f5b70e4f8c9fdb8e8c76b3c911c0f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583f943a25d7d510ff0055647a7636edb
SHA1fb1c41dbb995e048b9ed751631b98f027c5c9ece
SHA2560ff17dbeecf5600516d3b770ee36c186d80c8b28de6e78dc1cf5d66827f196aa
SHA512661989bb07826f7b8fccfa403acfe38bd3c2bc13c3bb3e8a38997617b2e96814f9d24c2f3d5c2cb3bde90122304d2cd04760075a8aa739e5e9fef18022739535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c97ffbe6c621d66fe8e14c69ef9c58f7
SHA1764c62c14d6d1d649e9eedcc213575ad4c1b38d2
SHA2562ff975ea257d50893b71af1ab77997c4cf72e9db711a395a53cc94f55d5deee6
SHA51223cca97c2ffec6a0339d29128e1de0e8b076039f132a133825ccbfb5a7e5e0d6279d5ebc6cf155458b21c68c67e1420c7596730d8368c5997af0121cbd99c71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a61aae79dca9b9b2933f772526f044de
SHA12dd04766590be56d5544459b75b39a2cf17cc04b
SHA256e59c97a6ab90f11a00a518cb4e1f84050754cb61f1ae379d2ebfae36d5ffcc2f
SHA5126636282fedb8289c39a765865c900ab4dc37a6ba326e4fd06192ad56ae814d77f1f04be591b0dd10a814a41b9e5f8e3b5911d683d9830245785b9944266fa61b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d431581e285ee4bf6e93e753eb74e717
SHA125fe6b97c99ab70b5c05c4727a9a7b48f9477783
SHA25611e2a482658276c98ebafc8b439098849a5c90ddcf652fa31001b1253a33b160
SHA5127b7595da482f55af7c6cca3648142311052080056fa247d9c1f6eb290babcec5b47a556c71ed8540de43f13f35e8e058989983e0b03318322b1bfe955fa3ce8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572a081d539a4d19d9c5ed87e19897443
SHA1d4d92985bbcbcc342345e14de9c6dba537d82751
SHA256cce61b0b52febf51bca18837b21341898bc08918db60f3baa7c92795b87b4bf8
SHA512565dcf867a8b348590d5572a125ed378cebdd10823cf66b55808e308e29b5b9d626272ae5ceb9a55b133f7ee0ebcf87b23d95c29c61565c292a6665d18206804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e884f1121b87100cd578c7af3ff9ce2
SHA18eb6ee0b9fde10f23ba2d0635c738d77259ada55
SHA256bd4d0a5e372510479e087ae51559dc85bc76fe2712996e483e06df640cb1d88a
SHA51231538397f98e82812af76a6c0bae568111f92cd12eeb52bc2474917e640e98ee9dc73dc0a11fce3b9256a2b1feb5c184228df4abe131d1dd9fd5ae37863e9b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdef6bda1705e351685569f8aa0f639e
SHA1e42668ba751a93af34baf8f1f6a2b33f9611fcd6
SHA256b84d332245277f4e38189f16286677b1069484651f6551ff7b7e8c173f695728
SHA5129f1d2481dd0c0ebe03b0f5165c83ae21fd4f14b83c5b7bfee5caf328d24d281c4ef8daaa01601e48b01480c0a767e99d785583bd12416ca45ae41b347a2dbf79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518620f40fc5fa6bd2c80a8ecf9065e88
SHA1cfbee5f752a55f4350bc7e476fd4caa502a32b25
SHA2564dd399f98ab6ee1b3f745ed6b768bb98c9aa61828b7b07256ca8d8602a79658b
SHA51296eeeb84ef3b8dc12dee311b919d10fef655c5f106c097a086742fb981f85e76193f726ca2bec8e307ff80a00828a376671b44737d04534aac07b9d676ff7d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0c9b3ea4755d5e5adfe25e85404f14d
SHA1357c2db570016374644df52eea9e0bd34263e513
SHA2566e70c6214d6a6a1df83f3d08aa04f6b285947c5bfe702de60190be52849fe88a
SHA5127d5f270ff10ff1d0e09daeabee35a7c81eb5b5fc31a6181a19e089e20cd3c1d8c6299c64f2017068bb66982fbe87f8c20831a5dad795f9ad59a7b199a74a8392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cbf2532c4ec6035679f735ae922a2b6
SHA1bebd3f0d3d82acfaacd9e4c8fc9a00db6f57ca29
SHA2567a36f0cc3408655e287c2f6267cf90c9b68edd5ba981948e68dcdc3661ccc50f
SHA5124b48237bc607f4f81d46731f406272224aea2fafb5393ebf7cdd4a87fa5b8d80419dffe36374e47612ea7ceda718f7d4f4834980d81bc258d5379b8a0de63b87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54241280ba89697ef2587800559d2c037
SHA1301b17fb233d628778976b7c3f8df4fa43fd508c
SHA2568a14a32672afe767a6e0fb4c4c22cf954e3cb175508cce489a270ad50a842c51
SHA5124537fc9551d9b5a584217053088009980a4a0fe4f19f0dcbce1f9ef4b2ed5a731aa513c09c89fd3d6f60bf66d96f6dcda4427f19fbdb7ee16beda6755fa0c600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8a6a649818cb9c00d104465f967cc6e
SHA154224215745bb08af634e43bcaa30cb748fe5f3d
SHA256c1461eb53f73f9bfe3570899a01766c3dee1c22b7356e125c7c217ab38936ded
SHA512f86583843447ec197d6fe613030d9df8bf6784acaed14bd8c5d193701ff5795bb343a07ab2813f1583c5f1d641badfdd35c114bb34acce5505d6c11b159fb303
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IO0LJX84\f[1].txt
Filesize35KB
MD567df4de51bc3120afb8d04f462c5fd6d
SHA1b7ec5527bf842ae2a30dbc8fc96bd3123ede88e6
SHA25621780823728d446904505efdd9887f514a92151c0024870520cde1849c9f7f65
SHA512800f534721098405c7412c3a07d5074d5e50d218ac94cb8cdd7db228945bad25170f2e2b77178dab4dd7de75f548a7fc652e1c46d931f403e5be4da3a73f214d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MEFTDE7Q\contact-form-7[1].htm
Filesize124B
MD530186f8c949f588e8613b199f1e9004d
SHA1431f950a4d1d3ec880dd89dfb749ad73bbd22395
SHA25674a2b4d655922648d7d56a441fb9715983955a0d99a90a8f43f550b2ad409ce5
SHA51221e035449bb0c3beb688073928f6b51dd1717dd16179434af2f116281b7c8ef2b47394422d7a7836b45a958b2ea9430905aa5e5c91df65624599428b9b671450
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MEFTDE7Q\date[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SVBQZB4R\transposh[1].htm
Filesize124B
MD5e90d8b1b2d6ccfd636695c5c2702739b
SHA1ecf3c7118d6bb4ed2a2d5db0c872169e282c85a8
SHA256c8275ee305a445611a508f26b7aeddec6d7a3381702613677a4489e87419f24b
SHA512d780e87ba84eba507022e414a2fac69903bb132beaf5f08ba491388ab223495c4973165d42b6d20f6c7257214a49a4fd9cd3c8c7386d847fb9a805584a2272ab
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a