Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
395332cb67003493c83b42dc2119f83e_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
395332cb67003493c83b42dc2119f83e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
395332cb67003493c83b42dc2119f83e_JaffaCakes118.html
-
Size
25KB
-
MD5
395332cb67003493c83b42dc2119f83e
-
SHA1
65307ac2e7540472f4ba748b5cdd2067b4a74004
-
SHA256
08eb70f2e8d329f7c1fe3eabf476994243d7cd83098f1e4109b16c2e5db449d9
-
SHA512
7626003f47ffd139a778affe0d556e51652289c340abaf1dd9dbb0e58088f800a43e6d0e61d2ceaf9604866aef825e2657c536c09158cd0f480b7ad6ab7077bf
-
SSDEEP
384:kK8lhGEuZtFpeJiZjdlbGlbRlb8yRqF7XlbOUG251GV:d8lhGEa9lbGlbRlb8lbdGV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D79F0351-103E-11EF-AB95-422D877631E1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000b67017571f7be95099791a30c22924202f8258163975089a10ce2f5b8c4df609000000000e8000000002000020000000759aaf50ee2454464625c4164bc80707661c4e9773b2082d613a2c448c95060c200000002aa4fb30e880b1123d2103f5667bd62201c2f6b0cbb02c6c1d3b11cea157c4c640000000a58e1d22541ae7b63822d4a8eef1d025eeed4a48f077b07e2416ffc4ee658ddbd05110f071a2b2d2c37f7a1a417ff0253549a3b127a25007d3601632877d94a8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b63fac4ba4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421666623" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1180 iexplore.exe 1180 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1180 wrote to memory of 3024 1180 iexplore.exe 28 PID 1180 wrote to memory of 3024 1180 iexplore.exe 28 PID 1180 wrote to memory of 3024 1180 iexplore.exe 28 PID 1180 wrote to memory of 3024 1180 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\395332cb67003493c83b42dc2119f83e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567e3cc474a8fba8f0caad664540b0095
SHA19a0260c66b9007f7ae97e5b9e70f48ace196b9f4
SHA25667dc6b7bfa1f2b24555e331622cffcb68628b6ea6cd64b0be7e63c90c7706e85
SHA512595d84034ac81f2c710c45e39ccf37fe5cb897c3e08cb316f83a19ed668e813744753aa9ce6c5416d6b1b4d4e5bb172f7049aa298cbe51bdacb347e2a78e64f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e65c2dfa51b85752e1c93c404dd43b84
SHA1ec4f8ade1f3830fde30b2ed9776b45036b32bfd0
SHA25612610e9c813487849b9a1d1ae5d84210aaeedb04b6f22763c4a8d5d6ea11d35a
SHA5124c64180a43b8c2dfaed218c8ddbf3dd9372643493dfdab83a7754f088845147b3e861b86d2c059402676b9de539a3a102177774834da3f286e1751f730e35e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511e1e5765c406dcc06b91a23003772df
SHA1fd95be2e4dbb9f3c9072302ae6c265b48280566f
SHA256674bc936f80f83ad14cf0dcc0b21cf50ac1d2ec1dc74c4f8818d8e3cfcf74738
SHA512651550f7f1ba9d3f56db78670b72ab8a07364ea32f74155eb351baf5b5f1b8fd8ccd6fe3ae381e53d0393350d093c0b6110557b39fc75b644d6882ef8be3b14f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2aae8f57ae8e014cc635bae7d39fbf7
SHA1de7830ad10a3baaaa11fabd75186527dc9fec384
SHA2568e8dceb730fac69fb2cac3cbc012826b9a1c7d16cd4947b3a7affe6fae0eb954
SHA51290e3c38279447a60bb97ec4c9e11eec296c8392222f444ec9958bd165003742232d4e5d37547c95879095ebf8253508d06be3582dbcb799db12966b9145159da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8f12743f90e99d7dbe089ef874c988e
SHA1b0a3266579bbf80968b77de850173ea8dd923ac8
SHA256ab749a3aa282793152afa8ec29e4cb8121b89bf405dcaa6aab6e0a60e68a4ac9
SHA512241ac33562d38f1972e1eb58515b9348706de05022218417a60d3d4d522e9ceddd2eb92036fcf1c86f28a89addc9d15ca1fd3b31f12dc9c5715779a32c02ed1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e8172317fb014b8069df79c4b5d7c9c
SHA11eee83ce2fb26cc912087a6848eb41e6d807d27c
SHA2569fb8dfe35c7c3d752928b8dd55d173a52cc19a1fd5b5ac6fb38e5edfc18494b1
SHA512b0fa11c62d8bad01652d5a076ea129c2ded761e24e8e082fa4a8472a34899d3acd7d6f5c9176f81e3efce06ac739207b1cf650133ab5a545c3e8a550f8fdd86a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fc2ef79d4a5437b5c30fe5c117f053a
SHA1ddadc55d6201e55118f7e8789d036873b486b473
SHA25626f9f369cee7bb4139b1e674442f732ffa8d262d5a98ca93f5391f8c34c0ed14
SHA512ebd70bef30a13726e26a52842d5604e9b852d46a88f83d7246fd4080a9217f4172ebcd52f0a493c34992df7bda8c667673889da5e27dcf0720470ab7cf4805c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5863067b309137f0de5f953f89d96d031
SHA172e9942c62bf72d82963f67043dba90f9758684b
SHA256a2b4c49d29d9dd495a6763a8f22843e0c5914e40955500bb4852cc7960ce194b
SHA512c379107e552570c416d3eca1c685c5cb9db66cc8bb2afa54d716aa48c571647a67caea8fd3e50716be4eebef0a218ceba2820c154f0dcb289556ff7968d740c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4329d6e5dd301df36f6b579c0824428
SHA199835dd77f75b30b3e791660da73cdc3227a56b9
SHA2568ee3f1b39c2f03f29e1dcdc2f3ee4f6faccad1e4a29748e52116ef108deda5c0
SHA512a8b81bad149cfb174ae102d883d2890673f2f9c2497cabb31c48acca6ed57473e852c3a3d7aea0253a494c0deb1eb2957382e764a242c20ad9eaecbb86c65bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe911d0337d19655e897959ea6724e72
SHA18026ef3d804c6bc977977ef3d63b950a71617e49
SHA256b24097f05568df911db37093e5b1fe8408d9a6f9f4c7e0d06c756e6c7325096f
SHA512ce27ad887e8b418dcc4cfcb1802ba081f465bf187ccaa5263ffdab5203283c5633f9adefa8c7c64ee728f42100bdf5cae511f0b721b46bf984bebede748d3972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551ff76544d499ff0c1fe18f29c21ac03
SHA1b2cfd5b28475313aa19b99c777b71c345bbdee83
SHA2563f8dd09de8f2c0d9e288303a7c549c6ddb413e8d6e288550696d50a196d3322d
SHA512a011f23d8f26947981b0c2919e6275131ebba3b696e6065df769a618c56505733731d4541d1caba27ee6c27fcc2b64215fef4cfbd10bc73f3df1e15e404244b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5888c6521695e5ba2202861e0fd1b3f25
SHA1d8881fe8dbc83655067309fb1d8a30e1d4b96032
SHA256ba72268952b5a694c7f43b880d82a8e9217eda806061982f4b4191244c60b541
SHA5122f92d10cc35fbee506b73c07686ffaccb5fd05f62ee02c4f6f4c4e226a9d40cd2053b66761d31042208bf8360b0d33519a91debe94b550c974a9de4157b7a7c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527f9e7e547a87314b830139baaf65eb4
SHA1b09c16c893fc7f005be3adebf8260a78c6a92974
SHA256fc5b082e9592ea8adf950e652d3e4d05067fcb4fdd5bdacb6238dbdbd3f309cf
SHA5125e3e3b500b0f3cdeb3980d5cb31c595cc5eef19d8f49c900f88b842716d8f57f9b36a866f1ec403028c3dfdf960390c74bb0dfa4c5723b6d62e67c7df5a935b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505434aaa41520291d61bd80842a6a7dc
SHA1f12975b9270c7ec6141f0476f9578fb17b80030b
SHA2566273518e4de5307f2449ec76a564c3eae2c350da4e089210f027ffa3e6d1fcff
SHA5127ffd81ed139946677e21a1459bcb57acb09ce41e4b7a79976f9edf705d9878e058531ae7d5b647f9bea289419add9ae074c944c0a7b0fe8933492c0d20c92a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50df3f0e7fc0dcc6fa1126216aa49121c
SHA13b1a5b290e36107cfa647ea1f861a2535e4da8a5
SHA2561d6004285fb2724a83f2e029102bfff0d8f69f14e543bfdb0392ceeb91550b77
SHA5124b981da3974effd628369cf247f31bb6af0e1420c45a738ac61af727df5b005f475bd0579e656c9e8e1e0c0e505d9dd3e4f922d68f98fb0d66b607c9d404dd4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff84d7b05a40459270fe557cbb58346d
SHA1cd31a9cbff8fe7c0a5c4d113aea7b7cdb3c8def6
SHA256032abdf8967d278f6a4d4cd9479c7c4209b15f65f181e26c96606c80558ca436
SHA512f90206c572e688d33bd34197c8f8f6223234573e515aa5fdabc091a17de1e0bfe1b85ac0225c99010771e19c1b46090cd97332f8bc651bd7981e40c878cde4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d8d9a98f5d5b4e91fd644831ab9da09
SHA1e350f58aaf1a9740abe326ca187cc4c260fa842e
SHA25651b8f2a8cb39e4ec9068e46382b3c96f64f25ec9e8141b54210ef8a6096cdb8c
SHA512847b124adfcc08e967442bd13b4582603aa8d7f40a5519793a52df32597a0d2099c0704508bf97d6dfdd32579120816860e70721362ee2e0bd82af6871970cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f1239bcac77b6871db843fbc1398313
SHA1252d053715ff16e37bdc9788aa2737a71afa49cb
SHA25632694af5224c9149ca995dd1fd8c882eccf6b7df32f191a383cf3ec5681fe6ae
SHA512a58de96eaab0ba8d8f226e51ef5cd7a9e73cee64987627af9522d65e7433e94271efc2a9f996089b808c0a21537f85e1d54250d9d5786e96075dc32759394bc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3893ebaa90ca847f1e89d0d1822a53c
SHA121d4a0b4d0273ee0621b26088375d7e837f6cd49
SHA25690fbc1e037a34496fceee97baf506fc4da014ede14eec56e42949a928721d518
SHA512ca67e59239c169a40f984c8cc0333be42b7e4820d5ffd7a871f2644bfde4f6f9825262749757773115e311ba8585a0342d55ee109b5ff1d3d7e4f5315e622dca
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a