Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
3840ccf1f3b382d757ea6e44f77c636d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3840ccf1f3b382d757ea6e44f77c636d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3840ccf1f3b382d757ea6e44f77c636d_JaffaCakes118.html
-
Size
68KB
-
MD5
3840ccf1f3b382d757ea6e44f77c636d
-
SHA1
2852ddd1bcfe59d1bc1d8d8f0fd88a46d553b277
-
SHA256
833835a831a1dd01319eb70719813334cb49f3f324da1e8e0c87a931d344d475
-
SHA512
711fe7888d29a92dfd6601de7a82b6f2eff1f2b0e73241d72c49c37646d363c6ee6ff021b0dbca553224e8fadd7d6e857ca98f9fc2cb800e7df4c2b862d7d17e
-
SSDEEP
768:JiYgcMiR3sI2PDDnX0g6JbuKvx+woTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:J4Yfvx+NTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20145ab824a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3C23AC1-1017-11EF-A1DE-66A5A0AB388F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421649893" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000012870f1e7c52c1201b37c15c5218c86944eac8735bd71dfca3f8d65934f233a1000000000e8000000002000020000000c122ae0252ff1ad1b991fb74493e507789b692d8535a2bb01cc9f0186f443565200000001ee88c3947e9d0d0804672c59d487251e0af922a62aa38fd318a1c440638f58e40000000bdd433a4195677a4b76c733f9f157f99dded413696d77851b19d66c82c1b3e354ad3281dc239dffd95564d490a658ded17c2dbc37eb85ed145d0ba01b45caa72 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1644 iexplore.exe 1644 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2052 1644 iexplore.exe 28 PID 1644 wrote to memory of 2052 1644 iexplore.exe 28 PID 1644 wrote to memory of 2052 1644 iexplore.exe 28 PID 1644 wrote to memory of 2052 1644 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3840ccf1f3b382d757ea6e44f77c636d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f54a0ee889777505a7ca379a3471d16
SHA1fd232a5d157db27100ed3c77b05aa313814b6fd1
SHA256a2a9b9210a968843ccdddd6b4d7267127ab09cb037f2b4f4f72046da6ee9e2aa
SHA51298976a8bb71b72d355724b801069489973cf46fa3433185d88de3eac27374bdd121b9ff1115be5f3b9819f59cb67c21acce4a8c6f98ffe4ddf5392432adfa745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589d95b070fd397b6e95491a16a60dbac
SHA102b5247772ff7636022e3afb93339829bfdee239
SHA2569d7efe28de0041b1835055da20c4084b511e02449a8fe458465f67035ee8d5a4
SHA5121f55cc6e9cb957074ebbcb45ac794e1527c90dd01ed2fe9e6502f25f68adb6a4ebf58aaa8fe9a81e5cb93509f0a0ae10095c1fc817c19d6d09794aecf01eedea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569fd30f807c6dd8c00f7b544459c29b6
SHA18029f31f957d46b4b005ac86671de2e56ead478c
SHA256f03a0a5147f21d248967475b43ab55092603c640baf96d538da5093b093c5336
SHA512d1213e3bcae5c88c09240a0af014600dabdad23238dcddb4c775da72560fcf3fafcea9b5d01473eaec4c8a3670f22267b998d1f0cb720b784150378c929f66ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac7cf2ba9d1673a1123c6f5c02d9488d
SHA162a6fe059c79cf6eb25cbc624cd02f00546bf6f0
SHA256910f3bbf347f6425308f53a9f57587920fdd48c1701064e55f9a6d73167fd894
SHA5120e962c81cb200ed1408f8c37b5c2f947851bac4555423234b2240d212b879234e22638295153eefcefab1e549031e9c51ed00c037ef5fcc3483697a6df12a8e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a52ebc42717f7e803297ca2e59bcf613
SHA157ba7eb04c811e7a74e42375b93e1aa47cdb80a4
SHA256fec56b67413ab778e81b0f9705cc5a3bd6e7c00f781db3dd0b60d4bfc1196963
SHA512714c644e7b3ab7bd51c9b6b84ef879e9990ce42467f6e6679bec40e72cd4a7bf97d1270a807bee9d3f1e9e992f393360f704284d5b54c3c72d9dee71f220de4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52af84e74e021869c4c978dbb60ab6374
SHA135be898e9db85480ffd520c10f0071f8036a117a
SHA256082195a876a62a0c78b9843c58f42943081a8d8637353b4d4503a984b9629dc9
SHA5129d406e8d2d28ba5a41c07da54b0f3aee89b2c3d0ea212fbd3d1749861d6b76485ef0aeebbbc33585b385593857f40e8d2f3a9e8e6c744485b9143a17e10b712e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5780fe5701073dcf64ecea679ad6f1e96
SHA1fc221aab25311359bd0474965d0172b23f7a9de4
SHA2560f9f82bd96c3877133167ed7cf5706789954b023f12351212bc0b07630e002eb
SHA512680cbc40abdf7edcc3078f9c3837f0860dd2fa514c492a296a32fc3551e3f72ee1addac730f67bfb9fc4d15b78ebe5fcafcac85fe05bed8aaded7c6ab473780f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6bdc6fcf1e5540fb07d5ff877e12dba
SHA1e2f4c6d201f916918c34c92fbed7f0e09469be4a
SHA256ed96ec9172a30e17f91e85271c411f00575a0f39b8c0990a1530c20e4c44071d
SHA512e4a00d7ec90784117729b43a0e58c4c786278da964d7a4a7503e32b806e30b498b207b507cdc82e4e0dfd5496740978a6c83d749b8712eb05f9b37cb00840fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8a917dfe0626cc8e17a90494674960c
SHA1f8680c88044e8111eeddd6811e92666104a73a75
SHA256fe4034b05b3fd10a0a98c184c9a454584788a45f0c1ae8d345e738627703c551
SHA512778ec5ba9ce71c168095bdd4d02e9bbb1edcbd6f737c913ec5085449c4dcbb299d72cf4405b2e089690a44c35cd5430bd21a3aa84c0768c97229603ff15785b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503f08c983a5799b33982f7881f9e99c7
SHA197f6d93beb54e61ebc43b37e2eb276f332864d79
SHA25629d2e6d4314a3aad2d64c6d3edf7ea62d31cb49a2837e3a01b05c457dfcac412
SHA512d1cece0300af25c7f675378c80e78bbf3d6951198f7411c5c49bb85a1bdf5b958f3491304dc339f1161f66954108bb744fb71bb59180049434a0a1c3e7b09a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e32988064c6f039f130d12c2ea510db
SHA1b1b042d376314b681ef07c8233e6985888d8f0f0
SHA256c026f1a211ddf195ca947fe82e6d0ad13f75508a0a5e4824ad487593b032e42e
SHA512eba330c736f7687b5eadd3053cb7ed99b880c4277459e935f9d0b6152adeb10bba7b34c3c52cd52a86842f891e775f5918ce46c604b1f913ed38192b6365ddbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0dbeacf1b2c8e4d28f8430bafc387bc
SHA18a39b6d86a55e837550bed4699169b35eb327366
SHA25651f4e521ee9d97b65f72c29410b04e0c3b230da07d0ab983d2988b5a09b31f62
SHA512eb7eee68d83c19fef358898fa3383d2b7e4a88e7819d2daa51f2ac38942356ebc5292cbd6508381c660471e6aaf73cfc6e5227bbaf382076e90f8707172b2440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52070134ab68b063142b5d893f9914b10
SHA1833401c794c8cc5b6d7b6749a77875ae61ed3597
SHA25603a10fc7abb02452995f3ec2cad2c03c2d7c72c870532df3e16536aa683a2784
SHA512ce5737a16e064e0253bab7a53bb8dad9ec34aabab530ae0ed8c86029f19730351692512f9e768678561728a869b6823ff968b902faff09cc8338e438a8840bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9cb9dd038adddd05aa6e3e18c8fe202
SHA1fa028842d988baa64757e6d1dbd94ba3d36b00d0
SHA2568d420bca58a3992dc21261c17b78b508d389f99138c733180678f397e9f617d4
SHA512a0f8dc8af6ce67f0ae2260b3b4ac3fb42242dd013ef6af2ab606721fff5ad438360f4cd6232e54d81fb7a442e0ed0e2739b4a26ebaf56a622b086fd5278f6547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5a44e61139db537413fe3d32b5b88f6
SHA11d8f93318d19d91fb5d725db90207d1f6beb4e41
SHA256324cad39e725266cabcbbb9fa05167c1a727a51b4a8f1c46abbc370068c18e91
SHA5120c2cb4b7670fcd0af48b0b2b596bcfdaea9b40bf70701c518f02359b0cad89ff0ed157e95054747cb8481f90a7a762303150c1bbe7e4222acb7eda2dfea44e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a823547020e3e2d810ff72bda635ac79
SHA1d19c5f49926233c1d090b4bcebaa892bcdeafa6e
SHA256bd76be1327e4b8df2aa9f9f42556272a5ee7f39f55d5af460000942e1131ee17
SHA51237ad789f11af3e35379ec36466a4cbbcfb3892c55c78ada03ada8f1e37629118ce97fefcb42130ec6b4e3d5370586a661da0b61ded54c05417dcff4fe7ea2277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571d67dc7ec8f0934c0d596bf34dcc338
SHA156a5afe43863c8bf47b40745116d3cbaf5ab3e65
SHA2561fe527503e1c46c3c94021a977cff0e61ab99406a45cf265cd6275a63a6d0569
SHA512095542194cfaef7cee9ada2de1c3178b30e1bacd43e0c1e0e3101141988059a991e1de5d420abe7376c199055c5474f36bf7a987d57b46062aab5361d5724059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50494bd895f3cb1ca81fcf45577fa3205
SHA18e7afc6eeb6bec2d2243a538221ee2f283a5d35b
SHA2562f29e3677d6f7573e4a7d3b822e1702954d87a445db648d08923814df44117b1
SHA51241e2b35e6d022c927447d505af45ab525cedfb4620501b98226fc340599dab0036b17783da286957a2d82ab230e0ee71dd9bae9a3f65e226d82363c0049b0359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de8ae3a76b06e396f8debc0c6be53588
SHA10b935a867ed2faedab0e9c501e5af98b86f29db5
SHA2560b98a4e5867584f90bdd55017502f58a1383e90142218b6b97b630f291b3f8b1
SHA5121bd6970935d356bd31915f732e96421e08337a4b8b57af86267bdb81df28cabc0f3c53a660f0f871d4c4d0cbbbcab104a0a53292c754324b8b6766d8aaabe6ea
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a