Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 17:38
Static task
static1
Behavioral task
behavioral1
Sample
3bfe1630838d1c8e60fc856fcd73d94c_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3bfe1630838d1c8e60fc856fcd73d94c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3bfe1630838d1c8e60fc856fcd73d94c_JaffaCakes118.html
-
Size
480KB
-
MD5
3bfe1630838d1c8e60fc856fcd73d94c
-
SHA1
f74b8e9e1ce108e497781506522a127126dfaaaa
-
SHA256
01963640972907ab8ccd7b25dafa2633cf41616db2623d569a034278539ea89a
-
SHA512
c8f92181954e0a8b71587a8dcb092102019383e9a06584245884d841cea83d64b4814a4beef45c66b6008d659a136e640c494dfc13ade2d2e732485e3888e8f8
-
SSDEEP
12288:z5d+X3EeSLNUFeRt0tPhckpQHiGuzz0s8T:r+Mxa0s8T
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x003500000001340e-9.dat acprotect -
Executes dropped EXE 2 IoCs
pid Process 2672 svchost.exe 2552 DesktopLayer.exe -
Loads dropped DLL 4 IoCs
pid Process 2144 IEXPLORE.EXE 2672 svchost.exe 2672 svchost.exe 2552 DesktopLayer.exe -
resource yara_rule behavioral1/files/0x000700000001451d-2.dat upx behavioral1/memory/2672-6-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2672-14-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2552-24-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2552-31-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxD3B.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50713d825ca5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000ef7b4485e9dab48497f60e31894d45d783b355cce93422855db781ce2f0fd792000000000e800000000200002000000065536b32b0109b8804d0d9689b30227ee5174252bbf8a20c6b5cc47a4d5fb97090000000e3ffb60bafaeac022bf2840da873cfa5260ccb6e58c38f05467b40b7245fb6242f9555c71a4b70f80f68f79058f7fd37cb32185c00c08a575193d2f565a76d34b13348130f7c374619d07515084cddcc0cb816841c4a005c0090c8e7bf29b5dbe9afcb114b8be016d7e265bcdfc1f3488f1bab25039647771a37eb6b2e2551bd4609087797c1af630a30ca1a55c5bd1840000000ea339954be2eb3b38709f1fe9ed8ec18d38950825bf470401f5b730374244a17945260c26d22c242576b9fff4af20033aa47c0ff2a040009b7c33878c4857656 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0FECB21-114F-11EF-9A0E-5A3343F4B92A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000005551a276e7ae6decf2b3dcc3f0eec807836cb3f89c0b66ba7da58a41649a6af2000000000e80000000020000200000008e2e8fe1a5fe5e232613dc9a8ebd9eb63cfe3e13b0e51c8a203a1dadad70d3a7200000007ac17f7cde2c75fd3c775a2e2be166ca460cedb449458ff2054cc6c95b8f0a6b4000000055c4069b01500a7ed81c636847ee5cd1686fa59e480da311824bddc8c88f48028238ba763068d5a7737dd63b5ecb7bb27a427cb9460a235596dfa52d27074fd6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421783785" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2552 DesktopLayer.exe 2552 DesktopLayer.exe 2552 DesktopLayer.exe 2552 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2672 svchost.exe 2552 DesktopLayer.exe 3000 iexplore.exe 3000 iexplore.exe 1220 IEXPLORE.EXE 1220 IEXPLORE.EXE 1220 IEXPLORE.EXE 1220 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2144 3000 iexplore.exe 28 PID 3000 wrote to memory of 2144 3000 iexplore.exe 28 PID 3000 wrote to memory of 2144 3000 iexplore.exe 28 PID 3000 wrote to memory of 2144 3000 iexplore.exe 28 PID 2144 wrote to memory of 2672 2144 IEXPLORE.EXE 29 PID 2144 wrote to memory of 2672 2144 IEXPLORE.EXE 29 PID 2144 wrote to memory of 2672 2144 IEXPLORE.EXE 29 PID 2144 wrote to memory of 2672 2144 IEXPLORE.EXE 29 PID 2672 wrote to memory of 2552 2672 svchost.exe 30 PID 2672 wrote to memory of 2552 2672 svchost.exe 30 PID 2672 wrote to memory of 2552 2672 svchost.exe 30 PID 2672 wrote to memory of 2552 2672 svchost.exe 30 PID 2552 wrote to memory of 1028 2552 DesktopLayer.exe 31 PID 2552 wrote to memory of 1028 2552 DesktopLayer.exe 31 PID 2552 wrote to memory of 1028 2552 DesktopLayer.exe 31 PID 2552 wrote to memory of 1028 2552 DesktopLayer.exe 31 PID 3000 wrote to memory of 1220 3000 iexplore.exe 32 PID 3000 wrote to memory of 1220 3000 iexplore.exe 32 PID 3000 wrote to memory of 1220 3000 iexplore.exe 32 PID 3000 wrote to memory of 1220 3000 iexplore.exe 32
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3bfe1630838d1c8e60fc856fcd73d94c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1028
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:209933 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546d03aec36ca24696e7fb1af04c14861
SHA19f386c91c49215a9e2fcbb9a3df52e6fe2e1a123
SHA256065aacd0c3ba2afd8cc0a55c04d8822a0cdf136928e32f768d960aba0a239cb4
SHA5125eca51eeb94656699588f849f56d4a52bccd97a23712d2a8af7dcaaa8f8cd08e7e12d68246a7bfe1120921b5b33584ded5732ab48e8f5e5c600de0798afe6132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2764d71073bb78ac2cbe8522836aae5
SHA1708f8c3685de771d1f063cc7abade7954acbb1f2
SHA2568fbc6b092eb4898982ce8595309f353ccfac49ecee513a4b236cb9e5d84fcc7b
SHA51224d227472abe91922f51292d2ae150d849ba4454338f66f6bae227c770b62e245edbdf7df7bd4a207c939f15c7be8014f901c699f61ee16b889b5495c63371d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544ede9bfd9fb89b6e5cc25b3e31860f2
SHA1c5b2e7b3e7c51ba37ea9f659c55c1d2c68ea4d0c
SHA25655817428465e6a7d31d4347fc6fa9da51dfcad3504754316fbee39c606e35618
SHA5126d1311db31ffd496e86df609d306a9f18ff8ad9bc380ab093444159a9350d5c504e416ea37d6bcd3be4230e47882678c378ca3abdd5e45ccb64ed342601513c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f64bd74d7f8aa8966e9a850f56ddbfa
SHA1b5729b75dbc02bf3fed1c1b67530d2d5cca76466
SHA2566687b1b86c531d15f1703d16fa18c66cfb2d1df3ea7b93c7197bf2f19be37967
SHA512013d9bf13b923c5a8957b7abe5a434bb76c51f0ddf98a13035be926729781afe7256e15681243bb3ef1ab47d0f66883287747f6a0337957142bd8d2410f10e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590bf92f5f3801c5e21c4204512b24b90
SHA1ec3badf3382b5eb57f2c5525ca34ecfa9da511ca
SHA2564993dbffb951217f96d5952b044f60cf2597a8a040a7a8f361c0a29b71ddd698
SHA512a7d076c394162ea05fc47796f8ce84dfef818aabf30b54f7514739456c7f06ea2c10d2560f0da588a9ca6ccc36fca7d22aaa6a5b15cd7087f803926049a8fa48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541f23ea018b798764af436158069eb3c
SHA10cf64877c80185d9c72dec6667adadc61185097e
SHA256735039de3bac71446176b2357d04e604dbc661e01437c0445c139452705bc37c
SHA512ff1dfaec87f7cbf1d3c3fea616e1accc42178928fdd02c27f67d208c565bf96c531da5b2651b7521c9fd581a9e721b7661f3e619002a80bf0f9b3f70aa51af82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573230791d52fe43db4cd352a17890d47
SHA18d508125542e207048049e06886597891871d128
SHA25631453bbbb1080926886db0da455085950759ce2868977ad69775cefbf51e75bc
SHA512d941349459e84ebeb875170bca22acf9f69ae144d423500088e29419cf61b54d3cbf5c6ab4ebea7875c2afd0aeb95c32619374befbea115d7f93e19bab037ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7da8ffed13250cacea91d902457dfdc
SHA1030b7206bb158b878548735c4f75a08e6a2558b7
SHA2566e2bb2be9753262ea9cff69c25208ef897b478cc3c0a839f00509ca0cca32a7e
SHA51232cc9fceb93759a138cc7edb35ffe3b98b8f545490ed57fc499d57a93b966d50be264084db088bc79c8a5d59215d0030fa1c7d4616188d4e9515651be4d4a742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55561f16c5ce572f9c464cba10232bc3e
SHA12ae178318fca9e2efc647e1b5e9ffe9204002d3e
SHA256aacc805f8e9ec72559e04480edcd434195fcd08ae5a4daf38ec42e3fb8baf3d3
SHA512231f9c0de894b0ab22b12678e1d238cb586732ff31334fd292d01c25555744d034d2a5c47ba348615eeac2509960ad7e97e62a905060d9564c7ba0a69b647327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7e3edefd7c43e99a941983aecf6758b
SHA1e5e9325d9c1685b1b2a1488055cfa4b62e930920
SHA2565da136cba2fe1f747f14ab1f7ecbd9cf67158ce6f49319490094ca4c423985c4
SHA51278f2f8caeeb648af08c4f262ed32385999f4eba69ea32c4fe23aa7eb0c770d153e286c9e7ea2d0a43421c0f06eeba72e848e8b517c7479d27cd3431c4614f2f9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
228KB
MD591cdd24eb0d7e2bf3c592c451c8600ac
SHA1d3e2abd8ee08d5d0a9e055d81db854af765f2045
SHA2561fee6ee9dec195db62854b761d9255e13b25c1a23ac51ef627c9e3c00fce362b
SHA51272b5ac92528cc69d9ebb785bda9a97692256ee9ad161a0b8ae47337d16d89201d4a03fb92e5285ce0ab8496ea34450f7e9797033e7047ee2e9a08bda41907f10
-
Filesize
172KB
MD5fe763c2d71419352141c77c310e600d2
SHA16bb51ebcbde9fe5556a74319b49bea37d5542d5e
SHA2567fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b
SHA512147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c