Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
3cc4350309d4729579a5b3f245259420_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3cc4350309d4729579a5b3f245259420_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3cc4350309d4729579a5b3f245259420_JaffaCakes118.html
-
Size
67KB
-
MD5
3cc4350309d4729579a5b3f245259420
-
SHA1
2f641aca9b8b4fd252366af7ace2e8d79469be3e
-
SHA256
4c7b0107bfb4737aa5176ca02da1cb5ddf789ebb0253f0658482c1d03d23b8b4
-
SHA512
34d8ecec0bae1f32c876cdba815d80870801bb15a4744526b2afd00a8cc09d59f99d4e885f07b79d76ea048de22845564bc88425f6cf9802aa1ce20e8e877778
-
SSDEEP
768:Ji4gcMiR3sI2PDDnX0g6e6+dmOz9oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:Jso+YEaTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421799996" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20bed43482a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000e1e3638214b758a4e06cc550ee5954ef06f0562ea8637d5f75e283fc0c682371000000000e80000000020000200000000c5a358bd53e5a5f3fb8a480f55eda356221df25e47960198375128397973d94200000009ea618773be40112cf9aa42a52dc302b1690d741d473acc57e29d846657da5c840000000bbd4b4beae4cceab2cb7677ce9c472396bdd9f953564ecb4ad2f4c48e19251b12997e3277eacfb23537793a00f0e2060686902f34565bd96faf8d6f1227cf4f5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{601FA861-1175-11EF-97A3-C6E8F1D2B27D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1392 iexplore.exe 1392 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1392 wrote to memory of 2412 1392 iexplore.exe 28 PID 1392 wrote to memory of 2412 1392 iexplore.exe 28 PID 1392 wrote to memory of 2412 1392 iexplore.exe 28 PID 1392 wrote to memory of 2412 1392 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3cc4350309d4729579a5b3f245259420_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1392 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f40d02ad50345d4439b43861a85684a4
SHA1180d7594740d79914cc70469c72636d2297eb547
SHA256fda0feb19b4bc64f41b858e7b8b058be9eb7dc403331a23db09862f092df3e92
SHA51297628d0ddfd826eb97702730b6fd1f7e01a9b72e57b9fab042790b866ebbeb42782701bff90a08511a34a08b6354b949b649908866e5b58572e35fa8ac71f16b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e04dbcb1007e6b45f8eaa28d9690ae82
SHA10b68c37d728539fafda5c8530ba97146904ce44f
SHA256d44f6b14e2abf238fd6941b11ebd80625170834c3ad531bf55583710f13e260b
SHA51218b4b0f525debd09bb6c282f1705d15d46f335de74bea0f0c5f67495f8718a5bef4e02d5cdee623d06a6f96d7a715ca1963e28b19a87431ab45c6b319a2ce0f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce69e196053b022f575b0844c20f0324
SHA1e8fdc0ad9624b39b76631329fba21d0d29b393c1
SHA256d9b51dfb9d5aed12cb59a7a625a2a4ab165f265f6f2d63b1033ef64af15eb1d7
SHA51247117d1f8b5825e2d2c13439a4fd963e0b574c9e32e5cdbe4bf20f57c8dc2ec8c47d7c8cde9115a8f83dfbfc02c7483a0111f1bb2c8766826f3ea0f0ec2696a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea1d8946748e39280fe08b982bed4424
SHA1a2d4a9b23200b782b047d07d52eff173443cd14b
SHA2566e866ec51c76cbb37bcf2b7b0527f80761d4de28ba6b3d1412924bb34b4fbfb5
SHA512fdb9afa3f5222cad64776b379b193ea864863a7dcf51f0beaeb4985765d3483acaa217602b5cc7a37867ef4023e23d799bf33e5c2ee28d75ca58883fc557e7c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52505275e56c966476ae6ca5da644fd94
SHA1a144d0f0c36024d718acc05903331f42d1467821
SHA256a69036c672b226d7858fd89587f339d11644ac54ecb489651d0e35d68ddb9712
SHA5120ae53a50d571a6afe42c924ff22ca6dd3ea16901753f830613d23fdd055c398c1bf3f4ee59c59d3d225fda53991bf1127a24bc56543e158c9c6af65451c98198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bc9767712976ac40ce30ba0dcaaf770
SHA19119beb2f33708942d1fc829443f44b3cc7338c5
SHA256165818c4d5a1bbac2b6047d0eb5cadf0c0ffd0a0dfbf8fbba299e04bfaa063a3
SHA5126ba78651d990323a0d81ed94385820f1622ce2d33de4008d59efa8cecc509fd7b0a9761ff4e20b5293b4118fd0f61948d3bf7237891deec2f7ff74c5afb653ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4ec124315c0aa97cb16dab42671fad1
SHA163a14d2f0b6fa1047d3f9b745ab18659a8684d17
SHA2566f574034e51a461f779fdb20ec6a7f8ab8404ce2a6a14008e087a5a5cfa59252
SHA512bbe4adbda10d5174ec429b8da74dc7b9148371731e5694cde3993c53e70fe6bdda6311c1549529ed0bd673230fb7340066aa5795ae57434dcbd6ea28a09f210e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d69fdd66c476abcd9bdb524c63e01cb
SHA1613476a2f0490d4c15c700381bc62d5a52952c64
SHA256828515bebb9ac38e443dbb3869f98a615b8b0f9014db17f11003d36d839a2b23
SHA512dd8a7a7d04a49d544b0fdeb0725df6ffaddada5b8fbc009af2f86e7591ae87b9d7cb714ad83882270fb82248e86046688a66ba5cbf3592f0977c8fc4f7936d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572f7fb7dcd05b3596dea5790ff6b7fe3
SHA19145d38aa2b9c5b63ee98f3606a1d000b622486a
SHA25675e380aa0e77040085832288f3473957e05e5e631543a1c4cfdea58f2b8ce92d
SHA512ef001e940f115c99e8c460dbbd6868726d664801ed9804901df60c7956b2ef80636c65eaf274a00d02ddd664590752b07caf594a2d8130f4131ff85334835158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a546b7af2d4dc2ff3e93e9f6535de270
SHA16957ca00f557d5cbc7be4924158704b79b8d4389
SHA2560a7e30ff2b6afef92477315ff60bcb0c7a9e1a1d71ff0dd10ea41e36c0f3be63
SHA5128d612d94f868462ce16e53069d7ea3024c1348006900abc816d67bc7e1eb60dc8b417951f2ac5ef43ab93cd46f797d0c9585210d69f7291679489a9dcd408710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551f81230a817723d39902141b497a4ff
SHA1a0caaaf51faa2ee445ec067a8646167353aaa2f0
SHA25625d565bfaae64912b48612cf33f63543ec79e42bccda7011e4d8d679b31faa7f
SHA512ceefaf0ed7a27c41cb9b31b2e9bcfa4429680446eabe2a4dcb56bd35a659d001930200249c835edff81435c2eaf7bef5475dd8462ec8986ce855738fb604b58d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e1b78f5fa77185e3304f18b2b64c334
SHA196794579e13954edb809826fd7e2a1da479aebd0
SHA2564bdd432bb0c4e1a45a08cbf2cc1f89055f20513b9abc9bc2139dcb7f83c32830
SHA512ea718ea3ad2573d0f40b83d4e058a4b71779f2cdec095267b94058949387d698d23a7ee1c7ab96fd031459add16cbec0d89d1a978b5495864d1a637773a31050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f0a7083e4fd8c484bcdbdfac5ec7c78
SHA1917db9c0e6225269bc8db8f4dd89e72d42f322f7
SHA2566fddb97b17708f22c90f41c23281eb5a5b410b9194ab4ff81e1a7f87d1353468
SHA512f83f900cfc747896cece7b41dc227ce2023f062f5017599d8bad59df7d73a6030bba67d3142effa05fe0e3d16d7b66b4415707dba9453ea4aa647006508f05ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505c3f33ef75a1dc211f1a4d5269210b3
SHA1a2c53466d47b24cbbf3bd1d70fc915da7d7ae945
SHA25697f3124d204ad361b78c29a366caf0f9876ce367628fe9793581db4baba68dc0
SHA51213d4cb8a836d6059c26db4591d886ecfb7d3fcf7fdc01ab39ec09f78195361380de45f29c334ae6702223aff74ec26b6ecd13ffcab897107218d407c7674a6f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52511849c89c17dd637f85bba151de663
SHA1c3f6223ffb8f5c731242e4199db8cb614eaf677c
SHA256280436460ab3cca3916abdbfce256b10fe2c6a4053b9d0ddd2a0f0f6009b510f
SHA51237fef3c4533e18e1029e955b2fca88c7cd6e5650facb375712fc59317482b9c41eb0d69b5535de654c22546866f1c4d260fb5b9ab9b2ffad3d8a4a601502761c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585cace774008f60dcb7084574399aa19
SHA15c6d898e2977f4ba0874330352654b5ceb75fe4e
SHA256088c61d11909f7b6ed74a11e3b973ab74040baf09b7e3a2684909ea36fca19d6
SHA512b125f774ac4556922efc41050bad175f9e5474ba98fdf1bf13566ee5411cb3c69fa5fb5432f3842bb992e79c4ed3d3c86838452d4a62568ae96045a79b96f495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e65852a84cb142646b55b47a5dfe82e2
SHA17242ec0094def0f5ab9c5afa7b839523ade31072
SHA25610e09fc7eed7607ebd882436c5c09b83390f97477fd4716765ead408b0369dfa
SHA512324c40292a654f3d969ab8d75eee4beb746be21943dc9a64915249eb83116c5228e43ab4b3d4e66aa2ddb4d07969a8162878d85fe501fa8c39b573451fd14e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bee652b55739d43c8c211ee5720d5936
SHA1809dd62c12a16456d41bb19cc102a30978425147
SHA256fe822382dee7266686c6bbea6eec6ffe81e9b5649a96dadf70b1b57f3e6a1d77
SHA512238beb447d438cd52f8bf2665e402ef32107a451b75d2090ae11c91527e0c3bbe96b2d5821c24864ac2e21ecc521d95c92a3eeb8b9d10514d3606b99c1153e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5588c85b573e2a813ad54f98debf22429
SHA1edb44de7f986a713bd7ea9cfaa452047d8b38b7c
SHA25690133126bb6a19bc2993caa3aa2a3392c2182938ea653bd5d74c4d8b8b8cba6f
SHA512c0beded67e67b1b5f19b6e1ca595199d9e182356938ec82ec2403ecfbc6425cbc358a9bea0c6e1ca58d0bcf62aaaa01e5f39ee22cb6a96ee970c4816be977497
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a