Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 14:01 UTC
Static task
static1
Behavioral task
behavioral1
Sample
3a7a650bb4f6c87bcc4e08bd9dac105d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3a7a650bb4f6c87bcc4e08bd9dac105d_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
3a7a650bb4f6c87bcc4e08bd9dac105d_JaffaCakes118.html
-
Size
8KB
-
MD5
3a7a650bb4f6c87bcc4e08bd9dac105d
-
SHA1
04d3bec584b38dc821fdf4edbda5cdd83d65dcc9
-
SHA256
aa46dda830be0f1b4f0840239d96d242db8be120518ff855e0a0b26b32094801
-
SHA512
ddc846fabbe30d270bf152b5000f82cc2f4cee2ab1883260f369a5e2ac262868d2bc9ab3ac038713d1d93f59d33b5c51901e4196c11f041e1a411b41f07207b2
-
SSDEEP
192:V+HGf1xg+WrOYTeAmPISeu0yeRsRJ6LBJD8DwDsDYDMDM:MGPg+WrN5qRkL5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4029f9fc74a4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421684369" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000009e48d7871fd4b2b8a0c2c2ff8cae1662669bfe072bde158dc414d6398713588c000000000e8000000002000020000000eae3e2e94613684b2f8662683850708929a84fedf87041a144e8b9c397f14ad4200000009dcce4a4b2c6620e01f053afd207b93906d0369907c76190f93ced75039ea06a40000000c964a0f033d89415af1c6410c09b6fe32e10714339ca12b4f28ea3111ee39dc173f2baab1a42e469ceaf923309ce5dd20ae44b6039ff4dd2ff4a0195b9a24cbd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{28747A21-1068-11EF-B6D8-6A387CD8C53E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 848 IEXPLORE.EXE 848 IEXPLORE.EXE 848 IEXPLORE.EXE 848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 848 2204 iexplore.exe 28 PID 2204 wrote to memory of 848 2204 iexplore.exe 28 PID 2204 wrote to memory of 848 2204 iexplore.exe 28 PID 2204 wrote to memory of 848 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a7a650bb4f6c87bcc4e08bd9dac105d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:848
-
Network
-
Remote address:8.8.8.8:53Requestorganic.vocorp.ruIN AResponse
-
747 B 7.6kB 9 12
-
747 B 7.6kB 9 12
-
779 B 7.6kB 9 12
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586923d4a35edb514c55f278aa4ed54be
SHA123e5e4bcd65d2b8876c739b5307e871e2eb4097a
SHA2568efa120fb7a0616656f25fc8fd12ff76d6f3aefe442cd752bb26ccb25e895343
SHA51212feda108ae533c47281ac94bbfd01d5950c06959885b9ab39557dbc07c81688685fc0684e138ceedcd803f581a56f0facaa9d4eaeaab932b7f1d1a6130498fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b81cff495d06f41e7c9ce845d480fc43
SHA1ade2205aa5091e2357d6d8cf320f383d5c40baa2
SHA25675b4aa1b298d686599b03c8dcf053b607bb104aa3e43cd8f02abbee02c152cff
SHA5122a7fc7c498937f931e67692d5de04745fa574727950a605ce63f65a156b22e3f2a71af9384e47d7199ed1bd932c09c4bbd703a5fcd4fbe3dae7e19b789d9e107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abd3244c9dfa2f57462a934985fbb9db
SHA1280afae40c4ad18aa4e02ce66b4963c85af507f2
SHA2565be235db58db4854f9cde0c6e15a194159dab71097b2391f531c323edc249b9f
SHA5128b9000797125c50bb6b89e72ed12c779e81e48f859471862eaac6a81f17f8e99157a852c86e3e87c9e9e6d372c4b85676903372155b4c765ddbfa2b32965b89b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9143b50b1f07463ea334c6b2f8f4978
SHA194327402181181f1e12abe898ff8c7805feb2a3d
SHA256a322adeb2f1a2d61303e29a5e81931b5d8ff4fccdb89db4cad94cafbeb5032ff
SHA51233018ae0eb2d5fd8565c3cefc4c69377093e460af8b2578f1a3f3f8b8acb2a4fbf1ee5ab7297472f79fd0bf53b73a2022d6855fba8681205b63fa68446416665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ade711b8316aba465bd51565889f83e
SHA1897a1535b69f945131863699547944ea1e348670
SHA256e5541b6e33ab839cf58c688d347c37765c653a20efa08bb74ca5185cc366d842
SHA5122a4d5159bdbed8d32f47c2304fc7ae573891ff77ec7c6dbbb9beecd682891227068726fb93bf04ae8c459b7bc8f9f53f6a972a5ec3f23ad9a0bc4baee3ae4d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f404033fca5947ac8496f48b203b513
SHA19b25c14430770749ecd25fbe3f2b4e43cabf05b8
SHA256cd2cbed677e3b6ecd4c0e61c9c3c9d2703ef914f564689e534695d73f38944c9
SHA51218ae736993a45482bda259257e43a3b3f5a67aea727e5746b75e8e800503dc2f894cc7b2a55421bbc18e60caf7f1b2cf84c97be08fdfa5b035751f0ea0928f7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599e6b84bf3667e54f60fe6cba8e93327
SHA1d877e4b783e355e85e380a71b3c9df8f47a2c548
SHA2568a4419cab1d13727198dc730691f7d0f583146b3e29590a46d7c59a1641383fe
SHA5120c58e8da03a15af470259200ce6a1cbdabaa4574f42977c88a4208fa60555a66b8570615421da5ff8ecd21e4402b112fd6763736a306091008cef93632072207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f22780a54f3bf44ac7bdb73d92607e92
SHA171ec117957e82d6ba5229a7313112c7f094b0087
SHA256bf79db2ae3201cb4d345848ff7ac6afa8635a58c470a3ad4e88b7ef1753c2540
SHA512555acbadd55793fb0b77c624b3a7d50f28be95301b0bb1860cd6f8170755155086c9617bcc9ba76eef26cc7ee786ad347fa63844e388d5576e0101d65b0f3fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da9958a2aadea7f9c2e6323f22738f9e
SHA186f7d46cd74e2d7996f9711d23cceb7d875f8dd0
SHA256239ad6e0c3bd497b36222e1f9251d90f5987c89067942e53791fe2501428823a
SHA51295a52c890974138f6bf7561e8678a0121c5d87debc7b00a90e8a768d998673a28c96eb15537cc9cf41be1d6a9eff61c01430f9457637a809506e70df65607282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0bf82ad93b7c81b9f64582f70fddff7
SHA136c3491d07185328aa1d71c6566c97c4d58d5625
SHA2563074dfc60ebf1ef86e507a8dfa421a2cf51c403ac82108a8acb9a549d8ad9bc2
SHA512cfe68e8e9e5ead37d4cc4e49d69ee012ccea4d47ca6cf8838f2d8d6eb54522be0cfc3983f6996b100ab204831890ac19475dfb8d5c5861cafd5081930422d9ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca26aef367cfa2c33cc93b3423f8b099
SHA1578af69bda8787e13d5cf19c7372b58ff6b703ab
SHA256cf60296261852212fde6587891100bbfd046839b2ff49b560316c91827b03d1b
SHA512eab97d2f25452561ea8a48f3550d2f265c93316e55fe864d7f085cb9616ce69c4b50b0cb3ab2010380614838d226d1c825a5d2992cfc1734de28593f6ae6a908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5882d72a92b3db243526e60682744bea0
SHA10f74efa66713b461d7ab238a58f73e087fdbfbed
SHA256b6d07b505c378c437ad92b1dbd1779ad70cabe45bbf9eca1082dd2b115ea6eb1
SHA512d7ca7a2d84b89791c3e78cf4a686b88bf37538cdc865bad90c58d38826a96a3b1b19732c0e9677db99d880abfe4b6b6701c215f092efc56548464da129428633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e81ed3d8a74d21e244af26d1722c3af
SHA19c91c71ddfdd00025bd1a29eac0c2e6685ae19ac
SHA256ee6562b99797abaec8ff6f4dffbfd9cd27837ecb36bea8f158582d268158e007
SHA51212cfbee11498bb336846ae1b73ced72f8ed6b582364ff77258916c86bbfa2137c8e2b8c1ffba83efa5f8407134b18f157c55d1c90029de913b90d0dc5b883e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544b5a11f446e7a36f1f16cfc9d123e85
SHA111215b77e89b907f1a805b77ea88803d65d14291
SHA2566514fb51d60ee5c76d02b3b4f6f472052f80aeca0d3d4cdc5f62ff2aed26ad51
SHA512ecee38591838377e0bda32fbe391c05dc96ca855738f244bb35bfd123d152d26f63d469146c25f0c3fb761f627cc92cfe2176fb07cbdaea59937bea5dbcac5a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a70d535e6bc7e77fa4f9627ae6b6f870
SHA1858d81c2d9a4473847c0932d9f4f8ce59eac64b9
SHA2560183de9afe2981ccb153737ba44dd8284bd41475fbc9f2a8a572cc16a26929be
SHA5126e00a92a469b5240d5a1984b2a69cb2031f1291448b575f383e865750406fd7e310962ee24f6945fc79e5429cddfddd81a1c40b7692c1d6d2f5cc3de10fa4023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51be033e5a4cbd46fabd379804bd213e3
SHA1d7663d7461c69fa0d44625ae9998c11426965443
SHA256f3a8298f250fc8a7af09dc7a09731257fb04a877bd73b0e10d544136edea5c42
SHA512b9f063a84ca4da69989af9946114b8859ac0d3b983dc910f0eb24e36c67f8241ce60dfd1f14ccb10202f18b6444e95cdc3d2ff886a6c1b34b33065941b2fdd1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532c641992059e3202913263413a5d955
SHA18fe70558707287d382910767106e7e7908bed6f4
SHA256aa6a52c5add824c3aeef3c1b38572fcd40994d8f9ed9087a416353557e1fd82e
SHA512c4d7014ea39d5f7aa632e5e83a3985f52dce6a995f04b59c1fd7213e50c64a96338e0c0f88d64b035d3a6045cf2ebd590365d1a3bf56bdc54e41775aff8ee199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb9f58b8dfbd891e567501ab94664c12
SHA1bb8418c3a488c711c9d6420b70d70f9452635cd5
SHA25666db3d775ec3cd1564cee6586804d8750b2fbf68d2adfe8d363cccceb5407f3e
SHA512a63489184b7cf9958194c4ffc20de920edb0fbc40aa75bd6be7dc14a1859eadf208e08f1fd1107a483f07853cc4e3883f7c7b4cf09cc21b7f9a17e07b3b1e6cb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a