Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
3d7fd7dd2b4522b94c3c6f06c16d6bff_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3d7fd7dd2b4522b94c3c6f06c16d6bff_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3d7fd7dd2b4522b94c3c6f06c16d6bff_JaffaCakes118.html
-
Size
462KB
-
MD5
3d7fd7dd2b4522b94c3c6f06c16d6bff
-
SHA1
4bf05931afea3cc4b8090a5c697e8f3284c78033
-
SHA256
b4a8986505fc8356668bf919d1c2d2178396befe260e746135bd5f29df9ddf01
-
SHA512
417529bda847554317aa9f2b28c49f56cd099dd85c001672762052ed1928d70da6d309d367ff95cf19e932cbec636787de75531692d61747aa80c34b1c91c027
-
SSDEEP
6144:SJsMYod+X3oI+YNAsMYod+X3oI+YRsMYod+X3oI+YLsMYod+X3oI+YQ:c5d+X3K5d+X375d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421817465" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80597ee4aaa5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000fa195a10e1c35dfc33438cdcc053f4c3fb2f1a42fff961c2fe74ccc66cffc169000000000e8000000002000020000000f34853d9e7d417ee75506037516f83fc3bd147adf617dac627395b7d7f03e29120000000b7cd0ac1224a4aed75e1e10a97a92aaebccbf229db1acdb374c15b007a92f38c40000000324f5bcf209c998b123237038a95e207bb373859d194829d070cf18be479b5df89250158f0874a968f335ea7febb040e7600c1cc96522b7016afcdb7c2f1ee5c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BE90BF1-119E-11EF-B02E-F637117826CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2936 3016 iexplore.exe 28 PID 3016 wrote to memory of 2936 3016 iexplore.exe 28 PID 3016 wrote to memory of 2936 3016 iexplore.exe 28 PID 3016 wrote to memory of 2936 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d7fd7dd2b4522b94c3c6f06c16d6bff_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d94b12ece77a8f58e7c1b1c0c794fd55
SHA1dbfdb9b87ab701219ce3759404719bd1850c568a
SHA256cd4d5a9ab88cdcf4462d901eefbe6d2dfa50d97344d6aa95d694d2f648549b50
SHA5129c73278054b8e442008378d07c7fa83feab4499199d8c9a9acf05d4daf2d0d1ff61d5c8c5c9dddf7a84cd3ddd2b836e6ccac8438f63217b8e18226ad4f109c25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d62711038712012dc6f267c8ef67c5fb
SHA10067f48f297f59b8e4fda79a05967526b4d35d98
SHA2567bb947ecee3520aa151938c267c16e6510df53c86d0ee31ddfb02c20212c4618
SHA5129549378cc5fcad1a2d41ee4457db2a80b74752ce04d2cd58f61b73d2cd4c3efc9e7fe376ac9ebc1d4897640e3e253bb54e123601907e340e909e837c6ceea775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d6b00f1603b2598e11ae71527cbad6c
SHA13a8810d270d0b1c073a9bfe8b49d8d768aaa9c03
SHA2568bc64820a222e1f51f3d351ffc101edec2a905cc7fef0935388b5a82614fd603
SHA512c3f7085a1fc7c1757a34366131a476f55d21cd66d2f71bbe507dc0ed1c8b8c0214f792948f4338cc92a3909b59ace3f06fda11ee43cf09a1459119dba5dd1c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5662d8ac107491c020457de44255fe423
SHA146fb2169e8f88ed6b43cdf74c79f861957aed65d
SHA2560ec531d42261fb8de7a026a35c73d8273eba22f5b55e158e6723194d3862dd12
SHA512df37cd2edd407c533be826f49b9624975709475c7a7def713695828f7e4a8b11719c0955076020420fc54bd98db5bd85e18483783598c1cac4eac7058c34abc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab392217f179ddca0ac45a54c841010f
SHA11a4a1ad474843e48619d0d5b5934e7e7dde398cf
SHA25694a61359cb2a353b7d5e32d2f87d6d80b70bdd9578333675534545aca9266e9a
SHA512f45d94bc166f937d87bde0a6badb40beff9c766fdb67bd6867461fd6e7d802775ac9dd53b479deee1a1fc86c5cbc5ec05082377a560445fc65efa01f5a466020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58120320d73b686417b783326eab414d7
SHA147ebef4aa74555ee214d78aa4112a55fdc22d9b2
SHA2569a8010b2b0621f01ce524b7b5c5945ee3f56685ecdb44271ea22b4210570d9e0
SHA5129b8c6668bcc87503f08d8da2fb99c58c9b2050b193ba34f1e59344deecc513ed5862e505c767ceb86ffab374b9a807ecd40c5edb46c0fd283a29cee7c49357e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5932f61796217c213f7fc54b3fc58c1f2
SHA18c30dfbae2dbf2da471ae4766aa22c872c4907b5
SHA2567e1ebba47312f76b6f574759335f638172751dc59c8b6f8db1cbfde4037091f9
SHA512373c2fecaca68616b48611a716cd36ef6204010ef41e3ba5687b3f649f3949f022f04e069bb540ed68fe703d6820956c4e68cea88b67ae6d00c4c5d257b9a514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55607aed87b9d244310e7a2a37bfb3fce
SHA12101be458ce543647ea1b871100ea2ee1137d199
SHA2566746899c0f4edde85a5428930fa80dd5367de8743f63287957cddb81074db3cc
SHA51284a598610ae8aae4cfc0a5c8ac95f1320a45939eede672fc4e3f526e64ddec5c66804cceb9aae90567f20ead3ac4c7cd63a9a3c8c1c399fea1365004bd895570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e6951664a590a27bcab8186db2da21d
SHA1cfb51f0b797f4173e2648cea21dcfa7111d1605d
SHA2560775640428c9aa31c0d0f989450e626166890ff400b4e9d98fdb17679c7da29b
SHA512eab70d22c7d6c18b629a3e3cd490eee8005e8743a8b52494af27ec93e401fca639f117e1851edd50caecb470c0d71451d80d5e37b42cfe46a313272ba4b0e79a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5562a4f6d78191976fbc0dcef6ff6f908
SHA18fea5d01e0e68e02a5f16c13a0e54beb3d889085
SHA256fb7856b3dfbc2e25dd465e6492ff091961b005ba44240affd98de72f14eb7363
SHA512ec28d35860e215e4e08d2818261096d6c6df1c7c1bdc9618c6361e51cf73aadf2f18838d23fba31c0027da714ae2834037d6b2bf5a9272f1eeecc2db68cc3898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c95a43a8109e3406f087a9c04537920d
SHA1830ee6aa567a4da2f786d60d8b5919d0dde261ef
SHA2564cc7ac77135dfc6056d3d85e806d2480036c2eda96697317d09216b48d05ecc5
SHA5128efac501ed7054d8b6931fa79f19a1eb2190401889e4b27b66567c4ddfbc6a9c2bf9606a0fe09a0afd418097cea77c5049ff48fa014b5245823e12937b1919ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8f0130ba0c58bdb07d24f739bf0059b
SHA1b0e56d1bf8078f4e9ea8f08d4eb899958fdd927f
SHA256524ee9099383429c42c767c839df033421db770176fdc93c2cf4186cf0c3023c
SHA512f6b739a5067c6b5ed01a0b4e29e488b78711fe55147d7bbe703219e433d30a7dc9169ff1974f50771ca071ea71544cb367670c33174e232abf9f239bb47e572c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecb2470e12b56ccfcac0fc50d3966b83
SHA102593e66dde28891d868281c5184c9d467f5e95c
SHA256614da80b6120e0d340f7c5db375a72c8a4b765154f80f49454b13e9d331eb69e
SHA512b2a9746438c2b9e3d64d56f74cb48cf965f6a2e485a337361f360500fac5c6d7167acb00dbb8bff93442f5dce5ae80930a83cb7ec9076894e71aed1d5c6ca74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5852317db433cf88c2a5d74c7ecf00c58
SHA1410608651c5d9c6ee6995ae353748c90c4020a9b
SHA2563cb0afe903d6f693d29cc087a418476419171b346115d9a50f787bd5aea9fbfa
SHA512f83428983d486310ae8fbcd512b907c296cd6833bd8545a1572983211b9b16b13b8876bf00176ee7cace91f0b00386b7bc5cd87538ffb665b45ab32b2423b069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce3df29a920952fce07efb85f7193dcb
SHA12736f0dba4efb4dfa617fd42bd998ca8c09e9698
SHA256e32d4fb137ffc90d6f1bd74ba886413392dbf3d5077cd1a299fb13f99362c22b
SHA512405719dd71a4672e12b2709c2fb394298fc434ac56a4820530245f4ebd8488a0f284152649c56577cb8647ac22bc5f8768e21bf4591bc820d5fe62c5b320c1ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5481c8e3674cf2461fd2a6c39c2f22c39
SHA155cc48eb706eb36520861503c85d0d147e1b4750
SHA256efd46028da56d97ab6d5adb6ba640515d46f021b386a91e3c89bcb4a7a709865
SHA5128ae1c5b5ea9eaf08265dba4a81d3bdd5bbbeb7a9765c054934fa74122dda96db4af32d38af39ca9fb6e13acd9f578c9cd9c6edf9dbd304175fac17d188ac26c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55987c432730b68c815c0e96cd845b957
SHA1d93f88cad313b90ff129e4d02e2ae887729672af
SHA256b304040da0a0affbe8267e09bfa244c03d228f7099c4a1fdbd8285fda6b16be3
SHA5126822da567608fa2a13cd97a258b909179944d030ef05358508f8e42f4b676adc2cbbd09ba403501fa63a27668b51b91998157b3898cbe6b13d477acc2f906702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f68492e52f9eb4973d0a18ba38cbf773
SHA12758f71c646da2a03dbb578dd8fdd7817f7f2606
SHA256cef4dae010a6d979ac1eca01cf0312de494cf843509666f0d2050c0263d03cb1
SHA51213658cf3c07710f78c181d97f2a8144484a39e786b65a1400aeb4cea24296b4ccc374fc5d63f4ed12533ed3a29d4f56c5519b512977cf479bf50353d8034a54e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c30738cd5f56400444e21142335e5b2
SHA128a353c4e95f518bd1fb51e7ee3b97208f586317
SHA2565c536146b16e5d4ada5b28b63d19d7b1735d5953df37b10b73962f217cb739eb
SHA5129bb021814bc581d74280bf071c2e6e3236caf7fad9778bc02a34cd14a4d44ce5a67a83c844681956dc4ae72193f4cb9fc4b8b8c737406d4cb130cf48ca2b3774
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a