Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
38c711fc08553a15341265fc48f631cf_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
38c711fc08553a15341265fc48f631cf_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
38c711fc08553a15341265fc48f631cf_JaffaCakes118.html
-
Size
33KB
-
MD5
38c711fc08553a15341265fc48f631cf
-
SHA1
319a1280b698e6a0550f324cfb5d3e242c9a2186
-
SHA256
25b5da37bf8c0572b61d087a2f6e31aa8147d54de6f0a4c9d6058b360951b20d
-
SHA512
191d6ac080ae0918532a62615abf9ab1f3f0d2dad621440c0e472cf36d007bbb6ca62b1fcc6cfbeac2f110fd85a4247b9b2580c9fac3eab94ebd3892e2c472e2
-
SSDEEP
384:SmcriyH0/ezX85g61YCCWE/W13PIU6qfwCcJWahqP/4NGLwfrOxKCuVEyo:s+I02zoQKfIU6qfwnhaDNKCyEyo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000009c6c10080d405617c7bed2e10132f0c496d88d0eeaf6d83ceb6e9f0171fa81ae000000000e8000000002000020000000de49ca3714725ba51a6bcd3ec6ff4b0012addadc4b11ec5d04a1ff26cebfaca020000000b2311b5a38b466cbea0fb704e44b5f26db33bf9e4143b7534a79210941e3ebb640000000f17a1426510e4b89cd69cedd596183bc9f1b27e8564131d157eecf966102bff0c345c872e126118b6777d395082f7a3dfed4dfbc7c14edb7316d2bd463485270 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2FF7711-102A-11EF-9A67-52FD63057C4C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90b8cecb37a4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421658079" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3044 2424 iexplore.exe 28 PID 2424 wrote to memory of 3044 2424 iexplore.exe 28 PID 2424 wrote to memory of 3044 2424 iexplore.exe 28 PID 2424 wrote to memory of 3044 2424 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38c711fc08553a15341265fc48f631cf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5295e75e1be1494cda4af11685516a14e
SHA1f9501911859442b77d1f4ca18f7cbb1d6f617ece
SHA256939354781ae3060df347aa00a84db5ba778bc49f17b967fb3f37080124054976
SHA512c79ae8c973978e802beea7db3c96250c65c42e27df879b05e12a38c1df7a8ac356f439b039521d2a989756f99e78b5b52245156587ef123b524a43951c5a87a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e2ff326acd78f8f3d4fb3f1c261ee95
SHA1f09a75abd945af05adf9c0ad3540c0614818b6f1
SHA25646f281005f50947b7cd3b77574fdd8745bd0e490558aabb83c3275efad5a36ca
SHA5124ca635b9236443ca2890758a46d397a39d425145c326cff5f5096dd58cd9530c6647679026d5d4246e43691a8c9d08bdcbc7fc3dba9db4516861fabc0ad6c287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8c31c1ffea5ef09f462b85ca21f2faa
SHA10fec18046b61317eef1bf239e5d6475a207232f1
SHA2563a038dbe52d626084b7025116e3189b91f6cafabcae19938bc3b1792875a3530
SHA5126a64f6ccb97f86907f5c8ee6c95ee4d1d4a21977dee8a4b63772ab754ca38dc442748d7286f6cda6d617f8adcf263d9918d6c27784cb008d94a15adbf4b2c6fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a762c19ecc72cac407512ba63ccf6f00
SHA1fb702fa7499d6eb245fcfb7a7292b574655d39e5
SHA25697ac7f6f4247ef9d1512bab4fe6aa81e305e8b8f6dcc7e1cf153257bad3cacdf
SHA512d611c75defdf853a77baa0efb4bd9944c93ec8408c84eeadfe95124da7c19464550897f427e46a6f6152d2ba0c9d4b2592739621fde0c96388c3f916c7033171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a13cf7e911bcf3d5231766938860c69a
SHA1f78f9f57c27787d6edd970b0fe489560e455abf6
SHA256771354322e39b43d7ef52bd21794a56df0c9b5f61c46a236da02812d94e30ee2
SHA51289b1b49f73bc8bb45ef58d598317b207bc891a1a64e06775eadb5f0e13609f3f0b556984ba7b25e019f36f681f311a2d3743867add379e2f602cd4c2ee835f27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596b35112ce5c47f6b251dee7fc1ed9be
SHA1531d36e0f751db57c88c2971e444ba58165425c3
SHA256b45319018684d8cffcc6e2862aa5e93e271b01ba5320bfb799f3607e0deeb001
SHA512a52f2ae8b50d98de1065035ba39b163751557a73ea928fd70c11862ff90e0762ff4772b90b859760be31c93ede626cdd03f9c70ba3d5ad910c4c3288e1b2e555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58229797e4a27263e24d789945e53b4d9
SHA1afd8c954d2146836745f923f6821c31ee9b33580
SHA256ba2af9412ba3a8e03cb0cd61f06aa69e116373e99dc5b5b7e7116cfa22c7b8df
SHA5127fd5c522fe7d90d00c189b08158af714884bb9c2069fd661c6670e93066eb44e4e56f8c2fb92f293525527a5fd371b016c8c240e8986553de88af125c3454812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd36cf5423ff173bc3a0868dbfaa90ca
SHA1b0c7a9cf0f13abee2a7ba99b4db8a5ba80cdca3a
SHA256de87f1e690fe579592dc7d14b911ec336dd157bc965cb7a5b965692922e278eb
SHA512ade87c8cefbaf90a821c4f9741a645325ad1ac58568979f61ec1a4e98e4b29a64e989fbbfdaa4ca319113026c0cf8dbe342f2cf74fa21d45af84b8ed9588b423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519fe91b06ba9f6cedc9e311382fdc5a2
SHA19f16fa70c0cbfa2678006692da9ac791ffa4d247
SHA2568b0c951a6d3e3c8bf1093ce7f1f8f48bba06552350fd17739a3dac6af9152ae1
SHA512467c17773e530f8288d5a0d5fd195cb1c0a12560e7ecce0bb5ed9b5aed49d7e846a563d324b5867a83190c4976a3109f65d75a744b0a5420e2d4e6b4c077a3fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6c6ae40f4c6e3bb5dc68312c379a835
SHA14b8163a3733a1fda1b5da0df9ada24458f74299d
SHA256f433eff66611adff34f89663421bf87dc40fab5671bee331a4d219a8917d1700
SHA5122fe7e618a8be0f450fe0b6c85e820231c488003256cb37cf8a617df410c713a7485844898f3cc2384f40a7f81eb7fee5b6298a7be13db9f49efb90784848222b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510b69fd35051362689954484bc9108a1
SHA1f466f04eb282e8a102de405088a15f7f5d400810
SHA256dda68d1472beea73380ff23445f7507120ddfc63aa6dba62386bdbcdc3b97d94
SHA512b59aca771143a72abe55c6f38f078cdf228544aac9e1067a6dd5134b1bf889ac4c314b13d92a94b6a03841f19ba91f9e0ce0fea05ca06d6f829b5d11bd70e207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575e98cb6e9fc6862126542aaa0afd680
SHA141dc7d3711d1b9ae711b7f8dd1cd19ea79f472c8
SHA25600778de108a1f4dac9ae28f59093746154518d0f5a27199f17d35ff03428e408
SHA51249e4fa1fab923f2d160c79aba69e0ed7069fca4af69225152ac2f77de54a9625e00c73e875993b09e68217f9508b6437d9c02a09ab17a8ac3b577f92893aeb39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c899d3e68885ad9265fb2951f306fcf1
SHA11d8e0fb1e1b8018c441cb226a3042efbd21b4978
SHA2563e5aa5709bebacdcfc5d7e4c2a91049ceb77930021b5d0b829b6d23d46e8e7b6
SHA512b37f7b4fe08cc81eb0bba3791e1d6dff51ea9080c25c8b3532ef179f03d420ae380982288f4168fb8f1a8867eee9ed913625df4da414d31c84a83934c83a6447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56814fdf39fcc1df84ca1ddcc8e47ed64
SHA14a79dc8f3cb8dead578fbd16a8ed7ad251d3c2df
SHA256110a470a06e47fd9307ef2a5b6798c72db7b4bda5e23160507a346fb857a1407
SHA5125cad9f3aba2cde641e6dbaae14f5cd86c5bdac2cc939df2f46b233fa224cf70aa1cf199d171ed584b47cbe108bba5693d98648ee96fa02b75dc28f9d8f5e53be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54240074adf29764896053b4d4cb685c8
SHA1d06f1bba43ebf66174a4e62914f78feeffb08f96
SHA2565177c67a039543336196d782d5f55c9ad7cb35c4ae74928f47ce5708465fad28
SHA5125d06d7a563419bdd1c6ca3f06e8ab413a2601944401936b0803fd45d944b4d9e50f4a5341230fa87b4b2d3ecc08e8e38bebaefc27894f1746aec56577c9a9d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f7febd81ec100ba1e0da1eb96a5a705
SHA120833af4772eeb2a9a47211476bb96052fee69e9
SHA25637515b97498a643a4ff6c716299566f8211fd01c2f6565924f12291ec50f12ef
SHA51244031f24a4f1c1d14eee9695c4341e1e5c2e11869f1f01ae7790a42206608928eab8479cd7ea2462e4e96070820e8ad2293eb38228b7d35c4905183b0ef0043c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532c81d955cbbe7dcc0a8431dfebfbd28
SHA112c506ba62609eb6af72bc1d051147da9188995f
SHA2562197cfad26cad54fcc75b5d2cd8102099ba1185c8665aca30c43ff17c0abe60b
SHA512ae2ba426442031a443baa7133d4d5d919b11e13f1e041a57d3fd0abe4c5d16a023d703a242f3d2b3ae99ab9d75e20a4852eae38046d8f62065e756b444d123ea
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OV51DDG5\Contractor-small[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OV51DDG5\wp-embed.min[1].htm
Filesize124B
MD53053eb852638db396230de9be3c27cef
SHA170aa9a86011eb2ee8e73020396da96e737195e8b
SHA2562243c2d051550a286d3967d95bd902bad89f306193227d3e3251dd16fdf86fca
SHA512486a3def8cb338118cda2d2d13b51057a8341d5d75ef4c3f8fff4a078070a424e331ad4ff60f8cddea83fdeb98cce9ae13ca88a22352217ba8a69c1a603177f1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PH7CXNA3\datepicker.min[1].htm
Filesize125B
MD5769761433d7882f7f436bdfa5296b827
SHA1ad5afa744c5a192ec18516c7105fd662022dc8eb
SHA256fa28631effc4abd9d203847f331a56009193bec19fe538b0fb17091b8e925e87
SHA5122704e1fe47a16ef76d35377a5b0654819bf5799c3d04fd35ad23c627a578494bfaee45f0e5c49e352491f0010f60b5dfb34ced752b8b199c7930b5d1fd41c8ec
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a