Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
3d35a61451cb915ef2904023cb16847d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3d35a61451cb915ef2904023cb16847d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3d35a61451cb915ef2904023cb16847d_JaffaCakes118.html
-
Size
460KB
-
MD5
3d35a61451cb915ef2904023cb16847d
-
SHA1
cf1be6f238255a99c0373e72fcdef5c91f9f9f2f
-
SHA256
3546a663dffe8b7dda2520c81d33a2d2f88f6eef4c3e06a783072105e21bfd92
-
SHA512
a165ce2e7e9d907a15ecd0270455aefc9319a8f2fdb5c9e071fce68d4d9e7d03290b8ee0f192c9a98e1dfe43e79466d72e629a036f2e765aa328531dda4f3f96
-
SSDEEP
6144:SBsMYod+X3oI+YcsMYod+X3oI+YYsMYod+X3oI+YLsMYod+X3oI+YQ:g5d+X3s5d+X3s5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b6ddec9ea5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000005cf93f2e56381c4907c2d3c30b63fdb71857e38855bf6991e7c95b807051c450000000000e80000000020000200000004b2fe8bdce7f7b1baf617d353b91d59a76f1fe17e6c219c89215c6f9712da6ad2000000080101262e82aa162db6a8a750d9c1aa0d8f88c405597fa7ae096de5fa838a9a9400000005d2b32c2449ecce12368c2f16a23122ea1f4d4cda6a6078fa7fb1821d3e4f1c41e0aff2e3ceeb6e92614d5fdb7c6ba76a95e98ad3fac6b4ca9082c27a7ece093 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421812324" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14425E71-1192-11EF-A233-7678A7DAE141} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1300 iexplore.exe 1300 iexplore.exe 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1300 wrote to memory of 1676 1300 iexplore.exe 28 PID 1300 wrote to memory of 1676 1300 iexplore.exe 28 PID 1300 wrote to memory of 1676 1300 iexplore.exe 28 PID 1300 wrote to memory of 1676 1300 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d35a61451cb915ef2904023cb16847d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1300 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54edf21e05a771dfcc196823328e9a6e0
SHA1dda8369223184ae25545cb00e4060e000ead1c48
SHA2562206dcf5dc8ffebe45498386d6f3436b29a1b81e0f3251d79d4e9841d98eef53
SHA512b0e97f2339d3ef954bc4ca40e20eaa267c4fa438b2cd5cfb9620573f681c0ab8ad961d7b344b261b4c659af3355c046279b2c80a4befbede37fe47deae754b91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555966c74eec915576303c5350afc90e2
SHA11731f019028da9a034f35ddfbe1863f397a5fd4e
SHA256d621fb2aec38798386d9ca6099524c1c0e3157390c1363d33f872e3cdbc06053
SHA512a11598496e39fb63d0112b66fc3b99711aa448024552d59bc155c7e0c27c696d63b01f025231efc806ec022cde1e1205c1afb59a4a60b2e721eec468e2c91051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9d8b5144bd580ccdf0192fb9958bae8
SHA11f4e85adb783685b0c76a9ec76f288ea90c41193
SHA25624d290df9af9ec815d82137fe6f43fea8cea9a9eb8513470a706c33667cabcbb
SHA512cab6917c739c2926d4f75cf95779b15fe7b474b18937cdcdca3e9939127bd46e20405c8db300fbd9bb47723ccd561f8d39f1156c2ce06170aa6213ddd5a9bd11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a24709d549a3b06eec94e28e99785b08
SHA1c6f1fbd5a29eef5e4b353cca376584d5c730f6ee
SHA2568fa45a47dd732521a405a42ebeea9c170133336c646034d824c5b6055960ae4a
SHA51228139b020b4819401d8e5ab82e76395d29047f9a51be3037280e32e9e209f517a48b0aacafb67e0378fe33aee3c68ec031453245fb4327e7790d8c95dd6d96dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573717b58291b4d227074c4e7eaaf8c71
SHA15836f84be4e29c658a0e04dc03085cc4fccea5e7
SHA2563a0393c7359c777e2ed52cbc6370ed22d384b2b0de9d580f61ccfb3697f8f73c
SHA51223acf80aea79703a662a63bd0b58a309d23adb08a7b645eb4fa993ef46ef48404e7b60fd805d7a2751d094aa1fddb324f8562aa2914c4d79b17d4c2461c6b71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fea8477c3e21cc8d7ddbea02fe2d398
SHA12c475c73f6139f6bf6ab37649a073d476db7bd27
SHA256709b6d098b506b82668ab3cc58f7589ca424cdea30b968115850aee0495fa9df
SHA512cbc0a55082175f8c95de3959eea9fb401d884bda74f8917ba1670ad952165b235a43e9ae3b636bbcf6595a600a271cdbb9fc2f7e3552b1b64fcb33ab225ecff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df56be6d2a9a30f05f2caddcf994b914
SHA18589b716c962e46e95faa3f7251de6093653e7ca
SHA25683133c89569b9e6614524d2dc6dfaaf6236fc3de5538ad19f55282fc37eb876c
SHA51268bcf091c8f6f26586be0257aa1a53cc769073a29d1d77535d84533d3542206f578bce905e2d7b5c7ec8cba78cdceb478a8738d52e5fe79dbbcdc19212678b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5e51b483d40fa4569bb211917baac19
SHA1f7ee12bebef1f3d4c95e4de1273dbe5cfcc81427
SHA256e45537c5fc85809ba8d3885a0f76ac300f05fdd2051565bf82236799e6cc3115
SHA5122b69f0d996efb029672c965ae3defc3398b8339f409d7ed976c4ab139a02802388d948501c4cffd318ec11e5f9864481a387bcf6e229527d51bd8d30ee477a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569b7fb407c2f3af41ae9d52e289d3b1c
SHA1e03dd1c0952358a8d9cd5857e1d57725788c1962
SHA2565750f0b530b6fec0973ca8b15122dd76b6a74ac8f45fed4875b6a754a39bcc18
SHA512846157abb4a39a1fff904f409a5aaf829543a3398d1c6201ba9076489cd848aee80880e4f8b3540ed7ab82887adfb967b59d982545d50f0f26660e83900a15bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f6a79abf6b7f52628ffa5818a1942d2
SHA19a7fd8cb17f3c3ababbda7ed204239b5253aa9d4
SHA256e6f4f846b8ab343b64953c82de4a2b02501c43799c6272422bb3ed8bf5fe187d
SHA512e0b273ae0f8e588c8209cac1b788092344dee9b503a3753cf141aca35430f67e42ca77b6265e4ece8363c678f1e1654e317812481f04c5fca5c493c7594aefec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568dfe24f17598c0543bdfa0cf3d87d05
SHA1d786c8bb7b009decc655637d2f32a545c35698cb
SHA256cd10172b146bcc6335ebb927c9895230625f6fec2fc53498a82dfb16a9a40b69
SHA5121d0807a1eda5adb3c8b82a0f9e7ad932117d663e785041d987a23d4690578dfc88d088442f149fd1ffe4d783aad5578dc591aa4de636e6c43a47f9a5dc83cf8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9d26b73c3a3aca460cb840ac723c6a5
SHA1628aca22232a3fbbbe63e21d37d71d8af8c4bafc
SHA2566525e4a6192c94730ca3a72660cbfc66c048f57f292edadc5bb61f58139d0d6e
SHA512fadf8358637ab48769c439add179b8c24cfaaf708fc67aec54d724bac3cd6a5e12eea1d8d9449afb1a3096c489dddb2fc1087f85b53c1bc7da58b1859b6bf41b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538f5267ab10cf5396de439d7cc8ad5ef
SHA1f9c39f14a2a1fb5d4040d6d8d02161f3b9e19b7c
SHA256f9c3a7c1094d867d659ab5c966868ac372cf4d0fc6c06fec971c68e996812812
SHA51268b62200217df5a1c10731f39455a87968536f6dd495fef45ab5b35285971e2ae7b6535c45e4fc08b207d49532711b6866f44ce5211fc1d0f917c3e8589846ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e08120dad84841dc73afbd7a1aab41f
SHA1caf6907c871a69cf6e538012f5aa2a12e3a1b6c3
SHA256a5973763d43d51b3d305643a56c4d4ec8659f4057d775d495f28d532ca54cc5d
SHA5126707e8005ee092af7cdb6bd5f3c2a184c13c64157455221887df551cf01264ad8f1aa88dd368bebd4c4841f8308c951f0df5ad93855ce31d5eedebed430aa3ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5381c3efc8f2e34feb0846362ef9b74ca
SHA1c10ca982e113f149637f4aea5d20d36b3f0def22
SHA2569db75477bb708beb6dba9d7a2771cbb90b340ee38433394b281e1f9af8e84b4d
SHA51215bfc6b0835d11a8b7e70d2f4f1113dc3d857356afca26f126686113835d7bc2c880445d9483258185291c0b70696a114a268e6a6b7c6a63ac9eeb12c55de637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569a3c9ad7d030333929ee09fd6dc25aa
SHA1b24ac593bb72cbee8017576f37df6b36d49f7567
SHA256c12acc6d6689f9327523328d00521f250ea6651f3035181200037fe645f22cf1
SHA5127089ca942ec7c3ef1174aadf57396f61e4a7cf6e34204ddad5cbaf8650c67475d2dcfbba3465587e4d3992451e0ee55be112f684a55fc4235ccb070a152d7474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596cbaf56dc588a9f41388db869222461
SHA1661f7e109018164786632b595d4ca361639b9e51
SHA2560c25b2a1501d16d8f9203e4666c6c35f4732a17ed41e39b0eb4ed46b8ff006de
SHA51297f97e6bad190c62256d747ffda0067be7bed0752c5087b30bbaa8f8bba9def5466cbf74a8ee2f160c625da4865c3d3d4bcc24b6154f5109717f04516e0bd508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eea6df8aa2405bc2e754df3382fb5e34
SHA1ec8bfe8721b306b429b56b5f07a60ebc770195b7
SHA256e5ec5791a756dddb0c48ca4c3c55c1445c12ab37e4a43df62da16afa1447e96d
SHA512d77740e4552f6faa5e869e71202526f9f7d3db669a38d3698c2e401a274b250c6bbb59c397ff92e1b3bbabca14f1d9416060b22c957f40ca28cf520a14edec1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3d9d1f41ffc46dbf000a5aee484158a
SHA19feef20552e8d09b32f918beab93a6b4978fa682
SHA256c4b12e54ab1eff5d301f82fb91bbe8097df5c88751525b6af86fed494cb20a06
SHA5126e6ca5f20ca23e0ecbe261fff67044931aee4be41fc3d12893cc7b782492eda4e234c41b2176c4bc011c23ffe428f7c04e05b3d0fb60f69b6c44c89c8b1df796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c27d4702cf6095296ee4d3a675d5811d
SHA10c3e351e9ec86888c4172743abf7c0c75a638530
SHA25634e77d46572d68010d2f0218b9fd0bdd5324423541b9d0929e2df206c2df342f
SHA51225928d948b2bb4fb17fdcbe7b0e27a3e8110fccafa4fed700f7ae755b4dfa8ec98876cf5abc58b6780421e70e431371956592c5bd430dc88488cd59bd4b40470
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a