Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
3959e3114befcdb760e3a4276b35776c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3959e3114befcdb760e3a4276b35776c_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
3959e3114befcdb760e3a4276b35776c_JaffaCakes118.html
-
Size
13KB
-
MD5
3959e3114befcdb760e3a4276b35776c
-
SHA1
6b33700e6fde1b54f67bbb314b2d3bcc5bb73670
-
SHA256
deb6af6b0823b10e07a56a5ebbd93a592ca01012b91ed5838a7f1c531bc5e99b
-
SHA512
9c7eaeeebfb6b376d874760a89d6fb3968c9abf2cbf063d07412f689649b6e0d33d59aa3e8cf0f8d6ab13b13e5bca9220ef0d9717ac785bfa7ead1260354f309
-
SSDEEP
192:fzWoGahJITEu6u16KeTQsyYoUegoDVFGWnsdiA5iYpsbH/hsMn50knpqbRaDFHEk:C7ahJITEu11vxJ9xom
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000793abe3a54c417fd15e465aaf351a4ff06c3694930febbf3e00bffcf99882699000000000e800000000200002000000073259adf2c99f70ed208c9ce59e04743583ffea3ba0ee4bd2bfb2ffe753f04e92000000020e667b51fbfc4428f9e8e52fd663693c25043af92924df00851c5d5ca27a5944000000032514c88d3f0eb836387b05d26b348d126f56be7dfd805e997979e02ccd59471c143089bfa6f773f12adc385592c931d2c25da4fc20e31329ec8b47892df494a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421667128" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001094d94ca4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04087061-1040-11EF-BC57-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE 2624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2624 3056 iexplore.exe 28 PID 3056 wrote to memory of 2624 3056 iexplore.exe 28 PID 3056 wrote to memory of 2624 3056 iexplore.exe 28 PID 3056 wrote to memory of 2624 3056 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3959e3114befcdb760e3a4276b35776c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541965a77ff0230bb7ebd11808ce13a22
SHA17b067116df90b05499444bb58251644522d5c10e
SHA25681e5805e4728efd9c69526433de5e8d2f9e69f1eb3e580eb7195f1dfeb694380
SHA51264dfc39aa9e1a5c00f841201c1575866769d9207b7a18b7e79ea9cae38e689bd12eca6762e8317f032f9a66867b2013fdd750d3d261407913b756a40e41d2538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c1b46b4918579c20b93eac6e4602a75
SHA12fd233437abb2f28cd11806bc18d0073ef1ed097
SHA2561fef011095763f06229b779eb2aa4f117357a5990e7f9f1d1f1d3e18d92d03be
SHA51281e99af13fd0afa28b6731ff17e37d3d88a5c46d620f60cd99002dfc9c2394e2bdf6ef95df62b58729192be3bf3d9d68dbc46cfcd3d7df424514c983b2a3ad47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c31cea5ca598fd8107bf64d9f4fdd9a9
SHA1de9655bbeb042a1a010ada4c1b42266a44f7e640
SHA256dd8b30ab5116fccd6a5cf35e940617ccd1e058ba39bfab3694235d2cb894db1e
SHA5124ae0c6bed49371cb32d6a0ee1f948481ea531f7e53898cc80bd2a65cf2f26385fdbe8255aef59594a33cf92950422275a69f25d9ca978c2c7054ddddb3cb380c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5f7e41fff810c4c307fbc0bd9fa7a27
SHA1e53e87ac6fdb4ade5dc610360e5d8cbdb4729ebc
SHA25660452fd6a8ba678df4e3825a8590c395145085890a1450af4615109033b75f6c
SHA512a2a0ade21e600a6c2f14a8ec1ca370e10b91953e40654970619621d2bbc254fdf0458cb4e596403ecf78631e8dc498a4445a9eafd0a2cbffff2b1eb4cf4e4cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f367fe6d60d5a1f256d4200a135d9fc1
SHA12e81f7b14823f356cdb27692a9cdce65fffe8f32
SHA256362d32e857d3df8f1cad063c34b199c2e23658697ad49d8d5cedafc80a78aee8
SHA512ce2e15d210b2acb0474cb47f2f18f6d7ede7f164afb61e366a9d39fd83b549c87762af5103e89b42d8313a4fb74da4b6fd98b864b0d779a2a1c6a8cb31224d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5477ce12b8ce53f504d19efeaefe5e9e7
SHA123247569ac045aa456e701e33fbd493c11ed62b7
SHA25683b264504fd7d926cef16a95dd5e8a20071853ea79a131857254bf2800335705
SHA512a7ad3c9e415cdfba15f89cf5f78253273d4297e6fbb86030b3a6341012d207cb17febe187c2e94c695100ea2dbe8538be14404aaeadf7b87d59cf388987410d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50873773c95dfecd751658699eff9b4fd
SHA1b9f76bdd186cc639c6fdd2acd80959a527f43dcf
SHA25692762cfdc80c11fcde6b796488ac87d677e91940cc91011e52e07d7c713ab395
SHA512d0b6c265b79e2d08008880a4e032c18b7b52c9741e3800bcb8f4d2809c9ca157f7788a41cc03c2c58ac98101ced77eef3a3b478d46c6b8c028a07151da88aeca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5817be0707ce685add428d22afb34322d
SHA1b8e9f078f3568cd77640445dba980cf26b8437b7
SHA2566d001b9a1edc68f1d89f6ac52ad900f7f76fc6732cb018d6fca55e8a0cda7e32
SHA512fd3bb5b38a523c736a11fdef0318efa5b619819fd90fe31df1f928a72bb16449de83180d1138a780bc765ef02abf04e745b2c5a203d72fd6e42a30bb11c746ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cb25cc9ce33799beeef20a3eff2404d
SHA122a1eaad9a269c1d136a3bab393dc634f91d0b58
SHA256a6b9040716ecdbf3a3c890680447f76d64b74d3af7cc4240c7e7c55ffd9df3f8
SHA512e68d4b2802f7b1737076457bef034aae9eec947f582150b226b12b1b73426a2c4b90c0fd2b03ad5b6bcfb13b38c5b2874e0a18dd92359ef828f12f6e8f473e37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51adc12e2c8d2eaa08162dd5a6dde225a
SHA174e585d773f0ba32c7a427432e19e59cd37f6185
SHA256936a426f6870717bfb9f2775d536b3a5f599f88f11b1f0525c59edd87898154d
SHA512576d992c1b6457860d36a83f8fe9a4a175b4a3f74adc59ea026c6df18c0051464b13959f56187465f00eec000dcdebd8fc786c56b7c76cc9804f0170384fda65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d0e8eb54062132415635a632af8f617
SHA1c3eda63250e056e9acb83f11ccfeffaa1eee8782
SHA2568c594368a6bd9d2fdfd84d6bc085b51585f5922e1c13bbf44d20e91dbcf59d0c
SHA5120b4c13ee17f4b27a9deae08d8cbff2a9ff992f131ecc30da5dd51c99195e1d176ca01fe091185b47238dede808282d354f421f7fe088df64f872a6f0639a6a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e61fb8f428faac088feef1d86555ca9
SHA1974e83950f1359f6a63cee8636bd9050fdb73f55
SHA2568e2d79de970d3181f7657c9768f908f585a835e3bce3de229557a59e5275fc2a
SHA51257333506777662d86e53c3938f7b4ea0e116ebfa9fbb511a05f58ce00195b32a1889bee62ca18d4ea624709b0d965d956638ecb1da253a6dc2a91cccb6184c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56242b5d929fbeac98367d411a4406b0f
SHA154dcedbcda48ada10eb91b41c965f29fb63619b2
SHA2567232bdadb7661de2e8c95a6f50cc938056345463df12446a6372d293582e6fde
SHA51229bfd4286feeed312a4ba3b68635c0853024a6687f58fcfaa94dd5d13370f2568ad18ae89d0240c62379fc7c030d7c7baa321c2d517c13ca088790ad58f7b6fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef73fc3b86748e93896a0662b0c26e97
SHA11abb01a5087fe0d99fc17c5059896f41878e81e6
SHA2567bcfbb7106424b651f46b19077eddd9f8887f763a93c9025927fdeec646c5c2f
SHA512c960ead3f5d7af1c884d75a3763a9cbf9f3b8d09c2de79c35515ca71c1ad6cee54330c1e8c73c357c00d978359a95dcd18e58cf4be8760cf2c232e3a990950b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b895b5b386ed727c98a7aa90a0d0f74
SHA1222648598c52cc60612a65b53d43d456cbad4757
SHA256402698958e209556235bf2e3e6ce638ed8bc2c0c27919f4cda31a19227bb8452
SHA5126caa5ff8a09221857d0f6bbc1a4d63a0773d70a22fa0f12d42706a99e2b3e82dbb2dbeb6ad93511f09bbee373fb744f869e9686bfffc60756ad86ec553c5938e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5b5a68ab2ddeee2402a536f0eb7ff7b
SHA1955bf53a1761e1c90d8854471327a4eb5989d9d9
SHA2568e564d9b9cff470560595c9b647c4509157b62c0dd87cef2630316c1c9f05d1c
SHA5120ad4d29fc96c57cfa77cb7571352e9e1a9ce6d471a9c6905a988e595e71885d074441ad00a0fd32f14d22532f990c7d794a85f5e20b27c3f94629a6d1d94626b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb83fc6e912e3d05732d3a552730ae34
SHA133678b83baf15de91e871c444c7bac1a481f6be8
SHA256a4560beea6adea84aa34251fd4880dd51083ca400641dd765f8a71bfa33865f4
SHA5123ef705f25261f1eb86b2040d1c1dc1f928df00d4a47aa045269bef6bbf1dfd1613074c715a13b9cc77228de97f7870643021328f17336a838dcd57208bb31499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596442c0760d0479f0a8d492a79dfcc48
SHA1eab29843ebddf53bf7fdd32d90f69d5fc69a305d
SHA25641d7126ee2a6500cd7bc97d3c715bb1c2ad09f3dd15304ce86be820dea7c2a6d
SHA512b629bd298ba36fae5b2b2bdd46cb0faf2abd966c36d7f92ecd0e1066fcfc38c63954e3bc59d3cdb5e49822d398224a2857f678e133e5cc2199419fd3c38c7e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e19c46fdb4d7d0658eb2b8058bb8cb83
SHA1f1123269f624b7aa80e71eb6965cd85b01c1d9af
SHA25617676bc392e671a561b2ea3647ea54aab345ae6fc42f4400db9008350df148da
SHA512356ad057650c18fcd209ca57cb8740bedb9f7de934bd18183bd5d8481b44c046940cc35e6b439ef4dda5df0673fdd9ccf78ca35c2c5e450e4e80865225a34c32
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a