Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
3b12907fca6b18a487991a52e2762ad3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3b12907fca6b18a487991a52e2762ad3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3b12907fca6b18a487991a52e2762ad3_JaffaCakes118.html
-
Size
125KB
-
MD5
3b12907fca6b18a487991a52e2762ad3
-
SHA1
f131ac8283da2d946642b98ffb048bcdb7a02866
-
SHA256
da42aaa566cc44ccd08effcb0f00db64cc7e4096ee77277e8b31189c296bd148
-
SHA512
6762c7535fad725a5b131df0276ecf561f644fa5172d5e85a7b1827604e4c1dbed042b99b072250d04b18d89b7b3d9e3c8c10d4163998192e5db3dbf38398df5
-
SSDEEP
1536:SKECCCCC22222ZZZhhh22277777OOOOOi3mANVSuKArYin8AVFX722NMNQRmNByV:SbSO2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3CECCC1-107D-11EF-9FA2-EA483E0BCDAF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421693704" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a07cbb8aa4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000007210a7d618c3c53c59ace29759f1284c8bae42869b0615193a27712e941cd5ef000000000e800000000200002000000008da80e56e6de8a00ecf6a20ffad3a403d6cad70c228e83bb27acc88da67be2620000000f0178f75f046a3a73e502ec54c6080f53a7785803a1f01b553cc34d3ca6528e64000000013bbcfb6929c619e209748954ae0c6561b6c5312f212905f6da61ef2636cd7287c9423bf143468cf14d20206b6e0a467ad6061412b99dc60fc9b3e3a5f8449ff iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1440 iexplore.exe 1440 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1440 wrote to memory of 2744 1440 iexplore.exe 28 PID 1440 wrote to memory of 2744 1440 iexplore.exe 28 PID 1440 wrote to memory of 2744 1440 iexplore.exe 28 PID 1440 wrote to memory of 2744 1440 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b12907fca6b18a487991a52e2762ad3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1440 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528f67af1be5632eacdf91944821ff0be
SHA17925e1605797ab54bc2b498f52a04729b5ba7411
SHA25615fa4c003b14d7f8e5850bf8aa0687442adb6b6d121dc09d913519020b48d048
SHA512c95c9f435508a0fedca13588b768a14d651367b994535fe4f074eb227188c4083a55c2db812d29993961411554c981730ae240895828e69300947db9efcff718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580b36fff63801a26e37d8359fb9359e9
SHA1582115bbb9281412721633389520497436775e56
SHA256fd97bdda43e1e509fa9e9ac121806683fcbecb7db68501e4ef08b1e3d5654a16
SHA5129e7655fe226c4b65b8dad9a68b7e95bde786a4e849ad9c7509c919569b10f845543d3d952539e6512330c8ccc9a13bdc705c6e81f63540452c45608a32f8b34d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548f95212889fe2bc134839950bebcb81
SHA16f8bd02236dbec724264b0bc88936eca30dcceb2
SHA25644c65906a8ca99237148b07300f3acd062113cf2e710f60d9e9ef90854a3446e
SHA512b4ea7422bc80e2af038974eca1ee8bf536a354ddd79bae352a8b9032939c84f5e188a08c5028374fb18aee6d22395c31fbcbd68223c8ff89bf246338c1f70c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5285f48526efed1538b1d393eef6c12c9
SHA19ec4ce3f1f76b17f50dd0760dd60582d0ab60a3d
SHA2562469cf173a648d000f9b4c9cfe67f4bd735a4bb0c686e88422b6aeb8a5754b00
SHA51221c644604170bbcf7ceae71f17c8cd2eee782d0b23c4d71c3c1a9c9125a7342fb9de7358abf182568e92db9bbc0939da339d5c19cf1c1f66052e189e3a1a204c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf9348923591e78f362951de5d8990ef
SHA1df0ef766ebdd89f132488ed0ec5a42789ffd732c
SHA2564b45e3fe3697ae2f147e26f9450e5a62c6d7983306c6604cadc5f65bdca298d5
SHA512359b75ec5d7eb026fe1357c79c6107b55030d547ba93fc847c950bd2b1da662721ab6ce3fa53cd67236bfcf9c08d574c08872faf35fb7c05162deff80bb8bfa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a7d227b7eb018aea72fa9bc55fdfafa
SHA14d2034543c6b4351caabfefdc25fe88b41c2c657
SHA256c64d3c972457a0b8b271316ec92888df6cdbce339a9cb118d9b7ca86d1501429
SHA5122636a7d6c8cd8cdfe32d310bff6f942c24b0e841e1b19319612a7b5b5da327f78d20fb06e06e3ad6df2e5f41363cd39025c2cc56c3754fd5fad620209938281e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a705512996af5371bdfae591d9928cf1
SHA157a2f50c3b71f21b41c9137fe684434ea2873bbb
SHA25603a3e62ea4c3ebb96fe0ef0e2375f6ad21f60116726a8b001abe95155059c1b7
SHA51269f68bf7780c6ad062e7b28e1e2c4c54c59b40940f7d31f119f4871c2a3d6356528ee70c8174365f2e430aefd0c61347b0c861e495b92fdc5227c36e27f92e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4342f0d0d2283b698d0d7d3d944d282
SHA1566cef3e8f8ac4320c43d3f0f7a008c32c351060
SHA25634ffe541f18a6df10276baa08556b44648b2a7fa128be5b34ee7f8e7cb16d4c1
SHA512220cffe607e8b94a8a49452779c4b2cc12aaddfa09c8486b595a660ef92225061650381119f022332730a095fa7f0624ff344abf0d07397369b663a0c39a0b79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59136070e58514539a85b7b56ecdf87a6
SHA185fb67be2e9464a368cf9d5b6fea1b834b4b37ab
SHA256452636cfc50e30b5e51d21882f1c0de71f21a5eb06280a51f8470c6d6adb9d24
SHA512265867bcd0611ca62fdcec96bfc8d54f98c40f39ec1c61ea3adc64a0ca5b8ca5f2600026c19724049a2c0fdf62998dea2da9a9077dcf04801620cf1597ee7be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a15b6d7d11322b7f5a2066a920d10a5a
SHA19dee882441fa95479b8e875551a70fee46015daf
SHA256fc28f16b28df1b992a98de1ffd032d7b7c97644b3a3c39c7e2d392f1e0ec1f21
SHA51264c177ee4f1020f7a17f1455f858fcc239ae2ca461f1b0b90cbfba0a60c2ff969895b393f70aff7cb0cd40248904d345c908a9fa45de17c246d7df0d3c2897d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1f10d824f50582da85e195765f8c127
SHA1a44256b56e6d2a51640d538f0467bc0ce92d664c
SHA256dbb340e4626f23435dc863ea45d8f0aadfbd83de24255fbc283ac10e364f6656
SHA5125661d4f10e0230f52bfc9bf31bed4d9a582dd28773db6b4b5b3b76d9f5948959f9705ed89c4101db5334d6138cc4b3001b35b9b11da49e292e79350190b6a339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5056569b519f2f4ae7562356579a400b8
SHA10eada911eb6988acfe7a6c0372087bf4e568f5c7
SHA2565b17fc189703aa30f7e92d39bb96ea32c77678558f156fc52eb531a9c637385c
SHA512c3a59133c8c6df2259a76155ff5b0d847dd29d93fe1a882387238d17abdce084afe6345715ad6274089c0d1079f717f0fa30ca262ace481a0f3584a8d37d064c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a19576d162a3508e4de2d52f574277b0
SHA129b4d901219dc9f8690a83445375ca9c2cff44a7
SHA25638e63e2c89fcd4db63dc959c3095954c71b529607c8fe17dde3a72b1a23c94d5
SHA512faa71f2160f2e4ecf5609dc2765b1ea6932ab07e61bda1597ccc9fb902f97986c57b7e9e3ce2e86f78c46c4fd7aca8f1633676d1b1024e62469b8f8ffb2187aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8b59a4a22ed16cd6c7d69a58ccdb6f4
SHA11c4fc88f902dbb91c4b9d8ab8b5349c93439f687
SHA25666d4bbaab0a7e6393ab8b06ca2b1009ae759370f807851338d9c65660d15833c
SHA5126c4bce5fc57d3685d24850e311eded794f9e5485d6a211f7779b19a21f1e6896eea5393a442ab50aa9b8ba473cfb2c69c8ad215efe61bea0e686823b1418eecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528cc5e3650ab549accdf4ad86736f64e
SHA14c7d266ecd61a09c4707e1490b4785204b7ad049
SHA256668e5f1a5e239361b611b373002a419257072d1c3cc33dc3f387621c7c810304
SHA512fdbeba4268e85fa847e44c5173a521802fdcb7eb36c263fd82a814d45ffe7d899c9578dd62dd42bb6b4b4a0c24e3ca33b7707f803551343cf130481c11e78ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50090b21c55a92692ea1cdfb4c55b94f5
SHA1cf6d3e129a81aebcd8f454f98d182aeaff845f44
SHA25650688f1e8544e09ab7f194ff47304d6f2a43ad5cc41ebab3b90634a73dbbeffc
SHA512c72f3cfa82618649e2bfed47d642a4160f28fbafaf70468e05a8fd0543f32c8ce9b40e0055554705232aee24a4090e8782a3d860a20bcf67f6668f71f6c3f7b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52adf8f9a16ec37f3a450867c4d9862ca
SHA169e4b78a5546085f258dd08343e93f199e6f28bf
SHA2566d8985152db0b4a29dac15ff24bfeeb2785699988d13f67f9a21591bfc5afc11
SHA5125838415969d302330e3b9fc646a16162ccc029e5d1f5fe674d19bb825118168b7239b42a36e9b52fa93d42d84168de12c117b89f5e325d10ecefdf6b889e404e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562e3835385f084abe30d5191a3708b7e
SHA177b42b78bd169adfff2ab26d18fbe1313018ffc4
SHA25618ebdb6c968a46fa8883b94a80b351a900af0d7d41f773d0def19c5396646851
SHA512bd61b0926c5413e75b6d9e05ae98ad39cd491a7176c4bea97ef9e54c9d4808c804c1cc4ccf2e7b3b6f67ab7a5bafd53b296ef022c91c274cbe5bd97fe75b881d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a